Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/367?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/367?format=api", "purl": "pkg:generic/postgresql@8.2.6", "type": "generic", "namespace": "", "name": "postgresql", "version": "8.2.6", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.2.13", "latest_non_vulnerable_version": "18.2.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3580?format=api", "vulnerability_id": "VCID-5zj2-a3y7-zueh", "summary": "DBLink functions combined with local trust or ident access control could be used by a malicious user togain superuser privileges. A valid login is required to exploit this vulnerability.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75128", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75131", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75162", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75138", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75185", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75206", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75172", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.7521", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75216", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75205", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75243", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.75247", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00869", "scoring_system": "epss", "scoring_elements": "0.7525", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6601" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2007-6601/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2007-6601/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=427128", "reference_id": "427128", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427128" }, { "reference_url": "https://security.gentoo.org/glsa/200801-15", "reference_id": "GLSA-200801-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200801-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0038", "reference_id": "RHSA-2008:0038", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0038" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0039", "reference_id": "RHSA-2008:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0040", "reference_id": "RHSA-2008:0040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0040" }, { "reference_url": "https://usn.ubuntu.com/568-1/", "reference_id": "USN-568-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/568-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371?format=api", "purl": "pkg:generic/postgresql@7.3.21", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.21" }, { "url": "http://public2.vulnerablecode.io/api/packages/370?format=api", "purl": "pkg:generic/postgresql@7.4.19", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19" }, { "url": "http://public2.vulnerablecode.io/api/packages/369?format=api", "purl": "pkg:generic/postgresql@8.0.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/368?format=api", "purl": "pkg:generic/postgresql@8.1.11", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/367?format=api", "purl": "pkg:generic/postgresql@8.2.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6" } ], "aliases": [ "CVE-2007-6601" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5zj2-a3y7-zueh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3581?format=api", "vulnerability_id": "VCID-f89t-37f7-hbau", "summary": "Two vulnerabilities in how ANALYZE executes user defined functions that are part of expression indexes allows users to gain superuser privileges. A valid login that has permissions to create functions and tables is required to exploit this vulnearbility.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6600.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6600", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74165", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.7417", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74196", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74169", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74202", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74217", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74238", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.7422", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74251", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.7426", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74286", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74294", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00809", "scoring_system": "epss", "scoring_elements": "0.74293", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6600" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2007-6600/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2007-6600/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=427127", "reference_id": "427127", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=427127" }, { "reference_url": "https://security.gentoo.org/glsa/200801-15", "reference_id": "GLSA-200801-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200801-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0038", "reference_id": "RHSA-2008:0038", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0038" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0039", "reference_id": "RHSA-2008:0039", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0039" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0040", "reference_id": "RHSA-2008:0040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0040" }, { "reference_url": "https://usn.ubuntu.com/568-1/", "reference_id": "USN-568-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/568-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371?format=api", "purl": "pkg:generic/postgresql@7.3.21", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.3.21" }, { "url": "http://public2.vulnerablecode.io/api/packages/370?format=api", "purl": "pkg:generic/postgresql@7.4.19", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19" }, { "url": "http://public2.vulnerablecode.io/api/packages/369?format=api", "purl": "pkg:generic/postgresql@8.0.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/368?format=api", "purl": "pkg:generic/postgresql@8.1.11", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/367?format=api", "purl": "pkg:generic/postgresql@8.2.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6" } ], "aliases": [ "CVE-2007-6600" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f89t-37f7-hbau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3582?format=api", "vulnerability_id": "VCID-h86x-6j3b-eqfh", "summary": "Three vulnearbilities in the regular expression handling libraries can be exploited to cause a backend crash, infinite loops or memory exhaustion. This vulnearbility can be exploited through frontend applications that allow unfiltered regular expressions to be passed in queries.more details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4769.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-4769.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4769", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78808", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78814", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78844", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78827", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78853", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78859", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78882", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78866", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78856", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78885", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78879", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78908", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78916", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01194", "scoring_system": "epss", "scoring_elements": "0.78933", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-4769" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2007-4769/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2007-4769/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=315231", "reference_id": "315231", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=315231" }, { "reference_url": "https://security.gentoo.org/glsa/200801-15", "reference_id": "GLSA-200801-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200801-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0038", "reference_id": "RHSA-2008:0038", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0038" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0040", "reference_id": "RHSA-2008:0040", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0040" }, { "reference_url": "https://usn.ubuntu.com/568-1/", "reference_id": "USN-568-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/568-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/370?format=api", "purl": "pkg:generic/postgresql@7.4.19", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.19" }, { "url": "http://public2.vulnerablecode.io/api/packages/369?format=api", "purl": "pkg:generic/postgresql@8.0.15", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.15" }, { "url": "http://public2.vulnerablecode.io/api/packages/368?format=api", "purl": "pkg:generic/postgresql@8.1.11", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.11" }, { "url": "http://public2.vulnerablecode.io/api/packages/367?format=api", "purl": "pkg:generic/postgresql@8.2.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6" } ], "aliases": [ "CVE-2007-4769" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h86x-6j3b-eqfh" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.2.6" }