Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/77973?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/77973?format=api", "purl": "pkg:ebuild/dev-lang/php@7.0.23", "type": "ebuild", "namespace": "dev-lang", "name": "php", "version": "7.0.23", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "7.0.32", "latest_non_vulnerable_version": "8.3.12", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49823?format=api", "vulnerability_id": "VCID-7mzw-4sv9-fkd9", "summary": "Multiple vulnerabilities have been found in PHP, the worst of which\n could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11628.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11628.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11628", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30347", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.3027", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30164", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00115", "scoring_system": "epss", "scoring_elements": "0.30299", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35745", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35701", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35678", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35718", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35708", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35658", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35714", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00151", "scoring_system": "epss", "scoring_elements": "0.35737", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45824", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45871", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00231", "scoring_system": "epss", "scoring_elements": "0.45882", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11142" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475522", "reference_id": "1475522", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475522" }, { "reference_url": "https://security.gentoo.org/glsa/201709-21", "reference_id": "GLSA-201709-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201709-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3382-1/", "reference_id": "USN-3382-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3382-1/" }, { "reference_url": "https://usn.ubuntu.com/3382-2/", "reference_id": "USN-3382-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3382-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77972?format=api", "purl": "pkg:ebuild/dev-lang/php@5.6.31", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.6.31" }, { "url": "http://public2.vulnerablecode.io/api/packages/77973?format=api", "purl": "pkg:ebuild/dev-lang/php@7.0.23", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.0.23" } ], "aliases": [ "CVE-2017-11628" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7mzw-4sv9-fkd9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49824?format=api", "vulnerability_id": "VCID-huuh-j4zk-p3bp", "summary": "Multiple vulnerabilities have been found in PHP, the worst of which\n could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12932.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12932.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12932", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82624", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82599", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01773", "scoring_system": "epss", "scoring_elements": "0.82628", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0209", "scoring_system": "epss", "scoring_elements": "0.84054", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.84296", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.84282", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02147", "scoring_system": "epss", "scoring_elements": "0.84291", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02303", "scoring_system": "epss", "scoring_elements": "0.84754", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02303", "scoring_system": "epss", "scoring_elements": "0.8475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02303", "scoring_system": "epss", "scoring_elements": "0.84744", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02303", "scoring_system": "epss", "scoring_elements": "0.84765", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02303", "scoring_system": "epss", "scoring_elements": "0.84729", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02303", "scoring_system": "epss", "scoring_elements": "0.84736", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02543", "scoring_system": "epss", "scoring_elements": "0.85494", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11144" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11145" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12932" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12933" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16642" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5712" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P" }, { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484837", "reference_id": "1484837", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1484837" }, { "reference_url": "https://security.gentoo.org/glsa/201709-21", "reference_id": "GLSA-201709-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201709-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2519", "reference_id": "RHSA-2019:2519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2519" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77972?format=api", "purl": "pkg:ebuild/dev-lang/php@5.6.31", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.6.31" }, { "url": "http://public2.vulnerablecode.io/api/packages/77973?format=api", "purl": "pkg:ebuild/dev-lang/php@7.0.23", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.0.23" } ], "aliases": [ "CVE-2017-12932" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-huuh-j4zk-p3bp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49822?format=api", "vulnerability_id": "VCID-t24w-4tau-13a1", "summary": "Multiple vulnerabilities have been found in PHP, the worst of which\n could result in the execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11362.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-11362.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11362", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.83931", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.83945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.83963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.83986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.83993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.84009", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.84003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.83999", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.84024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.84025", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.84027", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.84053", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.8406", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02083", "scoring_system": "epss", "scoring_elements": "0.84063", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-11362" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475373", "reference_id": "1475373", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1475373" }, { "reference_url": "https://security.gentoo.org/glsa/201709-21", "reference_id": "GLSA-201709-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201709-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:1296", "reference_id": "RHSA-2018:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:1296" }, { "reference_url": "https://usn.ubuntu.com/3382-1/", "reference_id": "USN-3382-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3382-1/" }, { "reference_url": "https://usn.ubuntu.com/3566-2/", "reference_id": "USN-3566-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3566-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77972?format=api", "purl": "pkg:ebuild/dev-lang/php@5.6.31", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@5.6.31" }, { "url": "http://public2.vulnerablecode.io/api/packages/77973?format=api", "purl": "pkg:ebuild/dev-lang/php@7.0.23", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.0.23" } ], "aliases": [ "CVE-2017-11362" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t24w-4tau-13a1" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-lang/php@7.0.23" }