Lookup for vulnerable packages by Package URL.

GET /api/packages/119229?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/119229?format=api",
    "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-229.4.2.rt56.141.6?arch=el7_1",
    "type": "rpm",
    "namespace": "redhat",
    "name": "kernel-rt",
    "version": "3.10.0-229.4.2.rt56.141.6",
    "qualifiers": {
        "arch": "el7_1"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58090?format=api",
            "vulnerability_id": "VCID-wj7h-fr5j-zudy",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3331.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3331.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88517",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88525",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88542",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88546",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88564",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88569",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88581",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88574",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88587",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88584",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88598",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88603",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88602",
                            "published_at": "2026-04-29T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-3331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8159"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9715",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9715"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2150"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2830"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3331"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3339"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213322",
                    "reference_id": "1213322",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1213322"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782561",
                    "reference_id": "782561",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782561"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0981",
                    "reference_id": "RHSA-2015:0981",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0981"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0987",
                    "reference_id": "RHSA-2015:0987",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0987"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0989",
                    "reference_id": "RHSA-2015:0989",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0989"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1081",
                    "reference_id": "RHSA-2015:1081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1081"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1199",
                    "reference_id": "RHSA-2015:1199",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1199"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2613-1/",
                    "reference_id": "USN-2613-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2613-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2614-1/",
                    "reference_id": "USN-2614-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2614-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2615-1/",
                    "reference_id": "USN-2615-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2615-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2616-1/",
                    "reference_id": "USN-2616-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2616-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2631-1/",
                    "reference_id": "USN-2631-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2631-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2632-1/",
                    "reference_id": "USN-2632-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2632-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2015-3331"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wj7h-fr5j-zudy"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-229.4.2.rt56.141.6%3Farch=el7_1"
}