Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/118226?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/118226?format=api", "purl": "pkg:rpm/redhat/rhev-hypervisor6@6.6-20150512.0?arch=el6ev", "type": "rpm", "namespace": "redhat", "name": "rhev-hypervisor6", "version": "6.6-20150512.0", "qualifiers": { "arch": "el6ev" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4017?format=api", "vulnerability_id": "VCID-8q9q-fs5n-gyfj", "summary": "Privilege escalation via emulated floppy disk drive", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3456.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3456", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.32263", "scoring_system": "epss", "scoring_elements": "0.96809", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.32263", "scoring_system": "epss", "scoring_elements": "0.96816", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.32263", "scoring_system": "epss", "scoring_elements": "0.96841", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.36084", "scoring_system": "epss", "scoring_elements": "0.97088", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.36084", "scoring_system": "epss", "scoring_elements": "0.97089", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.36084", "scoring_system": "epss", "scoring_elements": "0.97092", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.36084", "scoring_system": "epss", "scoring_elements": "0.97093", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.36084", "scoring_system": "epss", "scoring_elements": "0.97094", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.36084", "scoring_system": "epss", "scoring_elements": "0.97079", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3456" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9718" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2756" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218611", "reference_id": "1218611", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1218611" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424", "reference_id": "785424", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=785424" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c", "reference_id": "CVE-2015-3456;OSVDB-122072", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/37053.c" }, { "reference_url": "https://marc.info/?l=oss-security&m=143155206320935&w=2", "reference_id": "CVE-2015-3456;OSVDB-122072", "reference_type": "exploit", "scores": [], "url": "https://marc.info/?l=oss-security&m=143155206320935&w=2" }, { "reference_url": "https://security.gentoo.org/glsa/201602-01", "reference_id": "GLSA-201602-01", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201602-01" }, { "reference_url": "https://security.gentoo.org/glsa/201604-03", "reference_id": "GLSA-201604-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201604-03" }, { "reference_url": "https://security.gentoo.org/glsa/201612-27", "reference_id": "GLSA-201612-27", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201612-27" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0998", "reference_id": "RHSA-2015:0998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0999", "reference_id": "RHSA-2015:0999", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0999" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1000", "reference_id": "RHSA-2015:1000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1001", "reference_id": "RHSA-2015:1001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1002", "reference_id": "RHSA-2015:1002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1003", "reference_id": "RHSA-2015:1003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1004", "reference_id": "RHSA-2015:1004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1011", "reference_id": "RHSA-2015:1011", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1011" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1031", "reference_id": "RHSA-2015:1031", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1031" }, { "reference_url": "https://usn.ubuntu.com/2608-1/", "reference_id": "USN-2608-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2608-1/" }, { "reference_url": "https://xenbits.xen.org/xsa/advisory-133.html", "reference_id": "XSA-133", "reference_type": "", "scores": [], "url": "https://xenbits.xen.org/xsa/advisory-133.html" } ], "fixed_packages": [], "aliases": [ "CVE-2015-3456" ], "risk_score": 0.6, "exploitability": "2.0", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8q9q-fs5n-gyfj" } ], "fixing_vulnerabilities": [], "risk_score": "0.6", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhev-hypervisor6@6.6-20150512.0%3Farch=el6ev" }