Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127989?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127989?format=api", "purl": "pkg:rpm/redhat/kvm@83-105.el5_4?arch=22", "type": "rpm", "namespace": "redhat", "name": "kvm", "version": "83-105.el5_4", "qualifiers": { "arch": "22" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87891?format=api", "vulnerability_id": "VCID-1zut-zzp8-zuav", "summary": "kvm: emulator privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0298.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0298.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0298", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67481", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67518", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67539", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67605", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67606", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67603", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67614", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67617", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=559091", "reference_id": "559091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0088", "reference_id": "RHSA-2010:0088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://usn.ubuntu.com/947-1/", "reference_id": "USN-947-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/947-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0298" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1zut-zzp8-zuav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87892?format=api", "vulnerability_id": "VCID-6pr3-u8uq-7fh4", "summary": "kvm: emulator privilege escalation IOPL/CPL level check", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0306.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0306.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0306", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3252", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32459", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3242", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32429", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32407", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32378", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32204", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32083", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.31999", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0306" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=560654", "reference_id": "560654", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0088", "reference_id": "RHSA-2010:0088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://usn.ubuntu.com/947-1/", "reference_id": "USN-947-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/947-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0306" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pr3-u8uq-7fh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87940?format=api", "vulnerability_id": "VCID-tgbr-6n9k-8be2", "summary": "kvm: cat /dev/port in guest cause the host hang", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0309.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73396", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73427", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73399", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73473", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73488", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73496", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73534", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73532", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0309" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887", "reference_id": "560887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0088", "reference_id": "RHSA-2010:0088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://usn.ubuntu.com/914-1/", "reference_id": "USN-914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/914-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0309" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgbr-6n9k-8be2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88036?format=api", "vulnerability_id": "VCID-wqqa-pr8h-4qe5", "summary": "kvm-userspace-rhel5: usb-linux.c: fix buffer overflow", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0297.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0297.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0297", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24863", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24942", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24982", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24823", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24868", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24882", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24843", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24788", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24799", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24791", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24769", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24708", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24697", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00086", "scoring_system": "epss", "scoring_elements": "0.24654", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0297" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=557025", "reference_id": "557025", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=557025" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0088", "reference_id": "RHSA-2010:0088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0172", "reference_id": "RHSA-2010:0172", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0172" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0297" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wqqa-pr8h-4qe5" } ], "fixing_vulnerabilities": [], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kvm@83-105.el5_4%3Farch=22" }