Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/130379?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/130379?format=api", "purl": "pkg:rpm/redhat/perl@3:5.8.5-12?arch=1", "type": "rpm", "namespace": "redhat", "name": "perl", "version": "3:5.8.5-12", "qualifiers": { "arch": "1" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89325?format=api", "vulnerability_id": "VCID-2s9j-mc4f-yuga", "summary": "security flaw", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0452.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0452.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0452", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16188", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16371", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16432", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1623", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16315", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16379", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16362", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16323", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16192", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16211", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16249", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.1614", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0452" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0452" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618363", "reference_id": "1618363", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618363" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:103", "reference_id": "RHSA-2005:103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:105", "reference_id": "RHSA-2005:105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:105" }, { "reference_url": "https://usn.ubuntu.com/44-1/", "reference_id": "USN-44-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/44-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2004-0452" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2s9j-mc4f-yuga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89244?format=api", "vulnerability_id": "VCID-3jvk-6vnf-gbaa", "summary": "security flaw", "references": [ { "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056", "reference_id": "", "reference_type": "", "scores": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056" }, { "reference_url": "http://fedoranews.org/updates/FEDORA--.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/updates/FEDORA--.shtml" }, { "reference_url": "http://marc.info/?l=bugtraq&m=110737149402683&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=110737149402683&w=2" }, { "reference_url": "http://marc.info/?l=full-disclosure&m=110779723332339&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=full-disclosure&m=110779723332339&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0155.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0155.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0155", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59023", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58882", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58957", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58979", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58945", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58997", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59003", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59022", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59004", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58985", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.5902", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0155" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0155" }, { "reference_url": "http://secunia.com/advisories/14120", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/14120" }, { "reference_url": "http://secunia.com/advisories/21646", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/21646" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19207", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19207" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10404", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10404" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2006-163.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-163.htm" }, { "reference_url": "http://www.digitalmunition.com/DMA%5B2005-0131a%5D.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.digitalmunition.com/DMA%5B2005-0131a%5D.txt" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-103.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-103.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-105.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-105.html" }, { "reference_url": "http://www.securityfocus.com/bid/12426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/12426" }, { "reference_url": "http://www.trustix.org/errata/2005/0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0003/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617476", "reference_id": "1617476", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617476" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0155", "reference_id": "CVE-2005-0155", "reference_type": "", "scores": [ { "value": "4.6", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0155" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/792.c", "reference_id": "OSVDB-13451;CVE-2005-0155", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/792.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:103", "reference_id": "RHSA-2005:103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:105", "reference_id": "RHSA-2005:105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:105" }, { "reference_url": "https://usn.ubuntu.com/72-1/", "reference_id": "USN-72-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/72-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2005-0155" ], "risk_score": 8.2, "exploitability": "2.0", "weighted_severity": "4.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3jvk-6vnf-gbaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/89245?format=api", "vulnerability_id": "VCID-vzbz-ntbh-4qaq", "summary": "security flaw", "references": [ { "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056", "reference_id": "", "reference_type": "", "scores": [], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=001056" }, { "reference_url": "http://fedoranews.org/updates/FEDORA--.shtml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://fedoranews.org/updates/FEDORA--.shtml" }, { "reference_url": "http://marc.info/?l=bugtraq&m=110737149402683&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=bugtraq&m=110737149402683&w=2" }, { "reference_url": "http://marc.info/?l=full-disclosure&m=110779721503111&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=full-disclosure&m=110779721503111&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0156.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2005-0156.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0156", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.5977", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59653", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59727", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59751", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59721", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59773", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59787", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59806", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.5979", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59772", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.5981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59816", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00386", "scoring_system": "epss", "scoring_elements": "0.59799", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2005-0156" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0156", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0156" }, { "reference_url": "http://secunia.com/advisories/14120", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/14120" }, { "reference_url": "http://secunia.com/advisories/55314", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/55314" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19208" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10803" }, { "reference_url": "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.digitalmunition.com/DMA%5B2005-0131b%5D.txt" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200502-13.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:031" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-103.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-103.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-105.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-105.html" }, { "reference_url": "http://www.securityfocus.com/bid/12426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/12426" }, { "reference_url": "http://www.trustix.org/errata/2005/0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2005/0003/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617477", "reference_id": "1617477", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617477" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:larry_wall:perl:5.8.4.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_id": "cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0156", "reference_id": "CVE-2005-0156", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:L/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0156" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/791.c", "reference_id": "OSVDB-13452;CVE-2005-0156", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/791.c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:103", "reference_id": "RHSA-2005:103", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:103" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:105", "reference_id": "RHSA-2005:105", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:105" }, { "reference_url": "https://usn.ubuntu.com/72-1/", "reference_id": "USN-72-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/72-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2005-0156" ], "risk_score": 3.8, "exploitability": "2.0", "weighted_severity": "1.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vzbz-ntbh-4qaq" } ], "fixing_vulnerabilities": [], "risk_score": "8.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/perl@3:5.8.5-12%3Farch=1" }