Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127990?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127990?format=api", "purl": "pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.8?arch=el5_4rhev2_1", "type": "rpm", "namespace": "redhat", "name": "rhev-hypervisor", "version": "5.4-2.1.8", "qualifiers": { "arch": "el5_4rhev2_1" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87891?format=api", "vulnerability_id": "VCID-1zut-zzp8-zuav", "summary": "kvm: emulator privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0298.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0298.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0298", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67481", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67518", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67539", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67517", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67582", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67605", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67591", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67558", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67593", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67606", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67603", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67614", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00538", "scoring_system": "epss", "scoring_elements": "0.67617", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0298" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=559091", "reference_id": "559091", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=559091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0088", "reference_id": "RHSA-2010:0088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://usn.ubuntu.com/947-1/", "reference_id": "USN-947-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/947-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0298" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1zut-zzp8-zuav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87892?format=api", "vulnerability_id": "VCID-6pr3-u8uq-7fh4", "summary": "kvm: emulator privilege escalation IOPL/CPL level check", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0306.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0306.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0306", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32371", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3252", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32379", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32427", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32459", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3242", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32393", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32429", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32407", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32378", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32204", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32083", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.31999", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0306" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=560654", "reference_id": "560654", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560654" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0088", "reference_id": "RHSA-2010:0088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://usn.ubuntu.com/947-1/", "reference_id": "USN-947-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/947-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0306" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6pr3-u8uq-7fh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87944?format=api", "vulnerability_id": "VCID-be19-1hme-s7aq", "summary": "kernel: e1000 issue reported at 26c3", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4536.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4536.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81544", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81555", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81577", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81575", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81603", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81608", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81629", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81616", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81646", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.8165", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81674", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81683", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01586", "scoring_system": "epss", "scoring_elements": "0.81687", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4536" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126", "reference_id": "552126", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0019", "reference_id": "RHSA-2010:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0020", "reference_id": "RHSA-2010:0020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0041", "reference_id": "RHSA-2010:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0053", "reference_id": "RHSA-2010:0053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0079", "reference_id": "RHSA-2010:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0111", "reference_id": "RHSA-2010:0111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0111" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0882", "reference_id": "RHSA-2010:0882", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0882" }, { "reference_url": "https://usn.ubuntu.com/894-1/", "reference_id": "USN-894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/894-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-4536" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-be19-1hme-s7aq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87920?format=api", "vulnerability_id": "VCID-fcjb-4n2a-auh4", "summary": "kernel: emergency route cache flushing leads to node deadlock", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4272.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4272.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82764", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.8278", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82794", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.8279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82815", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82821", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82833", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82829", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82868", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82867", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.8287", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82892", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.829", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0181", "scoring_system": "epss", "scoring_elements": "0.82905", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4272" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411", "reference_id": "545411", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=545411" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0046", "reference_id": "RHSA-2010:0046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" } ], "fixed_packages": [], "aliases": [ "CVE-2009-4272" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fcjb-4n2a-auh4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88649?format=api", "vulnerability_id": "VCID-r8cf-83fy-4yhh", "summary": "kernel: ipv6_hop_jumbo remote system crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4567.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4567.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4567", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89736", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89754", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89756", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89786", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89784", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89777", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89793", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89787", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89802", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89804", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05055", "scoring_system": "epss", "scoring_elements": "0.89803", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4567" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641", "reference_id": "548641", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=548641" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30902.c", "reference_id": "CVE-2007-4567;OSVDB-58753", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/30902.c" }, { "reference_url": "https://www.securityfocus.com/bid/26943/info", "reference_id": "CVE-2007-4567;OSVDB-58753", "reference_type": "exploit", "scores": [], "url": "https://www.securityfocus.com/bid/26943/info" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0019", "reference_id": "RHSA-2010:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0053", "reference_id": "RHSA-2010:0053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0079", "reference_id": "RHSA-2010:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://usn.ubuntu.com/558-1/", "reference_id": "USN-558-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/558-1/" }, { "reference_url": "https://usn.ubuntu.com/574-1/", "reference_id": "USN-574-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/574-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2007-4567" ], "risk_score": null, "exploitability": "2.0", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r8cf-83fy-4yhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87942?format=api", "vulnerability_id": "VCID-raqh-x8at-ekhf", "summary": "kernel: r8169 issue reported at 26c3", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4537.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4537.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4537", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87929", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.8794", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87953", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87957", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87984", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87995", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87987", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.88001", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.87999", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.88017", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.03723", "scoring_system": "epss", "scoring_elements": "0.88023", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4537" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907", "reference_id": "550907", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=550907" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0019", "reference_id": "RHSA-2010:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0020", "reference_id": "RHSA-2010:0020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0041", "reference_id": "RHSA-2010:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0053", "reference_id": "RHSA-2010:0053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0079", "reference_id": "RHSA-2010:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0111", "reference_id": "RHSA-2010:0111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0111" }, { "reference_url": "https://usn.ubuntu.com/947-1/", "reference_id": "USN-947-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/947-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-4537" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-raqh-x8at-ekhf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87940?format=api", "vulnerability_id": "VCID-tgbr-6n9k-8be2", "summary": "kvm: cat /dev/port in guest cause the host hang", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0309.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-0309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73396", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73427", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73399", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73436", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7345", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73473", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73488", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73496", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.7349", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73523", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73534", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00765", "scoring_system": "epss", "scoring_elements": "0.73532", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-0309" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887", "reference_id": "560887", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=560887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0088", "reference_id": "RHSA-2010:0088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0088" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://usn.ubuntu.com/914-1/", "reference_id": "USN-914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/914-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-0309" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tgbr-6n9k-8be2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87943?format=api", "vulnerability_id": "VCID-z5bw-m9x1-pbht", "summary": "kernel: e1000e frame fragment issue", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4538.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-4538.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4538", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90185", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90201", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90222", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90228", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90236", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90235", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.9023", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90247", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90248", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90244", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90258", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90257", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05503", "scoring_system": "epss", "scoring_elements": "0.90253", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-4538" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214", "reference_id": "551214", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=551214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0019", "reference_id": "RHSA-2010:0019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0020", "reference_id": "RHSA-2010:0020", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0020" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0041", "reference_id": "RHSA-2010:0041", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0041" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0053", "reference_id": "RHSA-2010:0053", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0053" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0079", "reference_id": "RHSA-2010:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0095", "reference_id": "RHSA-2010:0095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0111", "reference_id": "RHSA-2010:0111", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0111" }, { "reference_url": "https://usn.ubuntu.com/894-1/", "reference_id": "USN-894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/894-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2009-4538" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z5bw-m9x1-pbht" } ], "fixing_vulnerabilities": [], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rhev-hypervisor@5.4-2.1.8%3Farch=el5_4rhev2_1" }