Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/357?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/357?format=api", "purl": "pkg:generic/postgresql@8.2.14", "type": "generic", "namespace": "", "name": "postgresql", "version": "8.2.14", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.2.15", "latest_non_vulnerable_version": "18.2.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3627?format=api", "vulnerability_id": "VCID-6dmy-t1qp-nuf3", "summary": "If PostgreSQL is configured with LDAP authentication, and your LDAP configuration allows anonymous binds, it is possible for a user to authenticate themselves with an empty password.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3231.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3231.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3231", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89629", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89643", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89644", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89667", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89674", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89672", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89681", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89682", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89691", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04962", "scoring_system": "epss", "scoring_elements": "0.89693", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3231" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2009-3231/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2009-3231/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=522084", "reference_id": "522084", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522084" }, { "reference_url": "https://security.gentoo.org/glsa/201110-22", "reference_id": "GLSA-201110-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201110-22" }, { "reference_url": "https://usn.ubuntu.com/834-1/", "reference_id": "USN-834-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/834-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/357?format=api", "purl": "pkg:generic/postgresql@8.2.14", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.14" }, { "url": "http://public2.vulnerablecode.io/api/packages/356?format=api", "purl": "pkg:generic/postgresql@8.3.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.8" } ], "aliases": [ "CVE-2009-3231" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dmy-t1qp-nuf3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3578?format=api", "vulnerability_id": "VCID-721k-9zdg-buhv", "summary": "The fix for issue CVE-2007-6600 (below) failed to include protection against misuse of RESET SESSION AUTHORIZATION.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3230.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3230.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3230", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74875", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74876", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74878", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74911", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74947", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74925", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74916", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74952", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.7496", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74988", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00853", "scoring_system": "epss", "scoring_elements": "0.74994", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3230" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2009-3230/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2009-3230/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=522085", "reference_id": "522085", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522085" }, { "reference_url": "https://security.gentoo.org/glsa/201110-22", "reference_id": "GLSA-201110-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201110-22" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1484", "reference_id": "RHSA-2009:1484", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1484" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1485", "reference_id": "RHSA-2009:1485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1485" }, { "reference_url": "https://usn.ubuntu.com/834-1/", "reference_id": "USN-834-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/834-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/360?format=api", "purl": "pkg:generic/postgresql@7.4.26", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.26" }, { "url": "http://public2.vulnerablecode.io/api/packages/359?format=api", "purl": "pkg:generic/postgresql@8.0.22", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.22" }, { "url": "http://public2.vulnerablecode.io/api/packages/358?format=api", "purl": "pkg:generic/postgresql@8.1.18", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.18" }, { "url": "http://public2.vulnerablecode.io/api/packages/357?format=api", "purl": "pkg:generic/postgresql@8.2.14", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.14" }, { "url": "http://public2.vulnerablecode.io/api/packages/356?format=api", "purl": "pkg:generic/postgresql@8.3.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/355?format=api", "purl": "pkg:generic/postgresql@8.4.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.1" } ], "aliases": [ "CVE-2009-3230" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-721k-9zdg-buhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3624?format=api", "vulnerability_id": "VCID-s8a2-wbb4-dyda", "summary": "Authenticated non-superusers can shut down the backend server by re-LOAD-ing libraries in $libdir/plugins, if any libraries are present there.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3229.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3229.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3229", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79871", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79878", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.799", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79887", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79916", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79924", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79945", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79928", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.7992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79949", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.7995", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79952", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79981", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01327", "scoring_system": "epss", "scoring_elements": "0.79987", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-3229" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2009-3229/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2009-3229/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=522092", "reference_id": "522092", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=522092" }, { "reference_url": "https://security.gentoo.org/glsa/201110-22", "reference_id": "GLSA-201110-22", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201110-22" }, { "reference_url": "https://usn.ubuntu.com/834-1/", "reference_id": "USN-834-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/834-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/357?format=api", "purl": "pkg:generic/postgresql@8.2.14", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.14" }, { "url": "http://public2.vulnerablecode.io/api/packages/356?format=api", "purl": "pkg:generic/postgresql@8.3.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/355?format=api", "purl": "pkg:generic/postgresql@8.4.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.1" } ], "aliases": [ "CVE-2009-3229" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s8a2-wbb4-dyda" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.14" }