Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/925221?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/925221?format=api", "purl": "pkg:deb/debian/icu@4.0.1-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "icu", "version": "4.0.1-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "4.8.1.1-3", "latest_non_vulnerable_version": "78.3-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88447?format=api", "vulnerability_id": "VCID-ktmh-nges-ykf7", "summary": "ICU: Invalid character sequences omission during conversion of some character encodings (XSS attack possible)", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2008//May/msg00001.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1036.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1036.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1036", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85778", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85653", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85666", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85683", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.8569", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85709", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.8572", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85732", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85728", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85746", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.8575", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85744", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02644", "scoring_system": "epss", "scoring_elements": "0.85768", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1036" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1036", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1036" }, { "reference_url": "http://secunia.com/advisories/30430", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30430" }, { "reference_url": "http://secunia.com/advisories/34290", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34290" }, { "reference_url": "http://secunia.com/advisories/34777", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/34777" }, { "reference_url": "http://securitytracker.com/id?1020139", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1020139" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42717" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10824" }, { "reference_url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064", "reference_id": "", "reference_type": "", "scores": [], "url": "http://wiki.rpath.com/wiki/Advisories:rPSA-2009-0064" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1762", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1762" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2009-0296.html" }, { "reference_url": "http://www.securityfocus.com/bid/29412", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29412" }, { "reference_url": "http://www.securityfocus.com/bid/29488", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/29488" }, { "reference_url": "http://www.ubuntu.com/usn/USN-747-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-747-1" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.us-cert.gov/cas/techalerts/TA08-150A.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2008/1697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2008/1697" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=464168", "reference_id": "464168", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=464168" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036", "reference_id": "CVE-2008-1036", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1036" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0296", "reference_id": "RHSA-2009:0296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0296" }, { "reference_url": "https://usn.ubuntu.com/747-1/", "reference_id": "USN-747-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/747-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925221?format=api", "purl": "pkg:deb/debian/icu@4.0.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@4.0.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925218?format=api", "purl": "pkg:deb/debian/icu@67.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@67.1-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925216?format=api", "purl": "pkg:deb/debian/icu@72.1-3%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@72.1-3%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925220?format=api", "purl": "pkg:deb/debian/icu@76.1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@76.1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925219?format=api", "purl": "pkg:deb/debian/icu@78.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2008-1036" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ktmh-nges-ykf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/88724?format=api", "vulnerability_id": "VCID-rx7e-dths-9yap", "summary": "icu: XSS vulnerability due to improper invalid byte sequence handling", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0153.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0153.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0153", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93621", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93632", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.9364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93642", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93653", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93658", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93659", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93677", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93686", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93691", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11643", "scoring_system": "epss", "scoring_elements": "0.93689", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0153" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0153", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0153" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071", "reference_id": "503071", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=503071" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534590", "reference_id": "534590", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=534590" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:1122", "reference_id": "RHSA-2009:1122", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:1122" }, { "reference_url": "https://usn.ubuntu.com/846-1/", "reference_id": "USN-846-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/846-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925221?format=api", "purl": "pkg:deb/debian/icu@4.0.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@4.0.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925218?format=api", "purl": "pkg:deb/debian/icu@67.1-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@67.1-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925216?format=api", "purl": "pkg:deb/debian/icu@72.1-3%2Bdeb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@72.1-3%252Bdeb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925220?format=api", "purl": "pkg:deb/debian/icu@76.1-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@76.1-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925219?format=api", "purl": "pkg:deb/debian/icu@78.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@78.3-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2009-0153" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rx7e-dths-9yap" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icu@4.0.1-1%3Fdistro=trixie" }