Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/432?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/432?format=api", "purl": "pkg:generic/postgresql@8.4.12", "type": "generic", "namespace": "", "name": "postgresql", "version": "8.4.12", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8.4.13", "latest_non_vulnerable_version": "18.2.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3618?format=api", "vulnerability_id": "VCID-2nve-471m-17h6", "summary": "SECURITY DEFINER and SET attributes on procedural call handlers are not ignored and can be used to crash the servermore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2655.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2655.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2655", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80425", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80432", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80453", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80442", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80472", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80481", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.805", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80485", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80506", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80507", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.8051", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80536", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80539", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01407", "scoring_system": "epss", "scoring_elements": "0.80557", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2655" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2012-2655/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2012-2655/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=825995", "reference_id": "825995", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=825995" }, { "reference_url": "https://security.gentoo.org/glsa/201209-24", "reference_id": "GLSA-201209-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1037", "reference_id": "RHSA-2012:1037", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1037" }, { "reference_url": "https://usn.ubuntu.com/1461-1/", "reference_id": "USN-1461-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1461-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433?format=api", "purl": "pkg:generic/postgresql@8.3.19", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.19" }, { "url": "http://public2.vulnerablecode.io/api/packages/432?format=api", "purl": "pkg:generic/postgresql@8.4.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/431?format=api", "purl": "pkg:generic/postgresql@9.0.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.0.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/430?format=api", "purl": "pkg:generic/postgresql@9.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.1.4" } ], "aliases": [ "CVE-2012-2655" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nve-471m-17h6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3619?format=api", "vulnerability_id": "VCID-35a3-5eq3-8bep", "summary": "Passwords containing the byte 0x80 passed to the crypt() function in pgcrypto are incorrectly truncated if DES encryption was usedmore details", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2143.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86493", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86522", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86541", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.8655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86565", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86562", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86555", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86569", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86574", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86567", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86585", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86594", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02995", "scoring_system": "epss", "scoring_elements": "0.86593", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-2143" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2012-2143/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2012-2143/" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956", "reference_id": "816956", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=816956" }, { "reference_url": "https://security.gentoo.org/glsa/201209-03", "reference_id": "GLSA-201209-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-03" }, { "reference_url": "https://security.gentoo.org/glsa/201209-24", "reference_id": "GLSA-201209-24", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-24" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1036", "reference_id": "RHSA-2012:1036", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1037", "reference_id": "RHSA-2012:1037", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1037" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1046", "reference_id": "RHSA-2012:1046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1047", "reference_id": "RHSA-2012:1047", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1047" }, { "reference_url": "https://usn.ubuntu.com/1461-1/", "reference_id": "USN-1461-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1461-1/" }, { "reference_url": "https://usn.ubuntu.com/1481-1/", "reference_id": "USN-1481-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1481-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/433?format=api", "purl": "pkg:generic/postgresql@8.3.19", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.3.19" }, { "url": "http://public2.vulnerablecode.io/api/packages/432?format=api", "purl": "pkg:generic/postgresql@8.4.12", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.12" }, { "url": "http://public2.vulnerablecode.io/api/packages/431?format=api", "purl": "pkg:generic/postgresql@9.0.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.0.8" }, { "url": "http://public2.vulnerablecode.io/api/packages/430?format=api", "purl": "pkg:generic/postgresql@9.1.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@9.1.4" } ], "aliases": [ "CVE-2012-2143" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-35a3-5eq3-8bep" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.4.12" }