Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/112834?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/112834?format=api", "purl": "pkg:rpm/redhat/kernel@2.6.18-348.33.1?arch=el5", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "2.6.18-348.33.1", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82195?format=api", "vulnerability_id": "VCID-639r-cs68-nyfz", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6074.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6074.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95442", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95495", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.9549", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95493", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95494", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95496", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95451", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95457", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95461", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95467", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.9547", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20044", "scoring_system": "epss", "scoring_elements": "0.95476", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-6074" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6786" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6787" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8405" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9191" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2584" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5897" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.2", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1423071", "reference_id": "1423071", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1423071" }, { "reference_url": "https://security.archlinux.org/ASA-201702-17", "reference_id": "ASA-201702-17", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-17" }, { "reference_url": "https://security.archlinux.org/ASA-201702-18", "reference_id": "ASA-201702-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201702-18" }, { "reference_url": "https://security.archlinux.org/AVG-178", "reference_id": "AVG-178", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-178" }, { "reference_url": "https://security.archlinux.org/AVG-186", "reference_id": "AVG-186", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-186" }, { "reference_url": "https://security.archlinux.org/AVG-189", "reference_id": "AVG-189", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-189" }, { "reference_url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/poc.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/poc.c" }, { "reference_url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/trigger.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://github.com/xairy/kernel-exploits/blob/0c3cef1d8aea824d07978fc71bfaa4b1d3bea267/CVE-2017-6074/trigger.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41457.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/41457.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41458.c", "reference_id": "CVE-2017-6074", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/41458.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0293", "reference_id": "RHSA-2017:0293", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0293" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0294", "reference_id": "RHSA-2017:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0295", "reference_id": "RHSA-2017:0295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0316", "reference_id": "RHSA-2017:0316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0323", "reference_id": "RHSA-2017:0323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0324", "reference_id": "RHSA-2017:0324", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0324" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0345", "reference_id": "RHSA-2017:0345", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0345" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0346", "reference_id": "RHSA-2017:0346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0347", "reference_id": "RHSA-2017:0347", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0347" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0365", "reference_id": "RHSA-2017:0365", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0365" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0366", "reference_id": "RHSA-2017:0366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0403", "reference_id": "RHSA-2017:0403", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0403" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0501", "reference_id": "RHSA-2017:0501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0932", "reference_id": "RHSA-2017:0932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1209", "reference_id": "RHSA-2017:1209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:1209" }, { "reference_url": "https://usn.ubuntu.com/3206-1/", "reference_id": "USN-3206-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3206-1/" }, { "reference_url": "https://usn.ubuntu.com/3207-1/", "reference_id": "USN-3207-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3207-1/" }, { "reference_url": "https://usn.ubuntu.com/3207-2/", "reference_id": "USN-3207-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3207-2/" }, { "reference_url": "https://usn.ubuntu.com/3208-1/", "reference_id": "USN-3208-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-1/" }, { "reference_url": "https://usn.ubuntu.com/3208-2/", "reference_id": "USN-3208-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3208-2/" }, { "reference_url": "https://usn.ubuntu.com/3209-1/", "reference_id": "USN-3209-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3209-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2017-6074" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-639r-cs68-nyfz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84559?format=api", "vulnerability_id": "VCID-ara9-wyj3-hqg1", "summary": "kernel: dccp: crash while sending ipv6 reset packet", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2634.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-2634.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2634", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87836", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87846", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87857", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87882", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87889", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.879", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87893", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87892", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87905", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87922", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87928", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.03662", "scoring_system": "epss", "scoring_elements": "0.87926", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-2634" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424751", "reference_id": "1424751", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1424751" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0323", "reference_id": "RHSA-2017:0323", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0323" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0346", "reference_id": "RHSA-2017:0346", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0346" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0347", "reference_id": "RHSA-2017:0347", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0347" } ], "fixed_packages": [], "aliases": [ "CVE-2017-2634" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ara9-wyj3-hqg1" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@2.6.18-348.33.1%3Farch=el5" }