Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/929093?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/929093?format=api", "purl": "pkg:deb/debian/libx11@2:1.0.3-7?distro=trixie", "type": "deb", "namespace": "debian", "name": "libx11", "version": "2:1.0.3-7", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2:1.5.0-1+deb7u1", "latest_non_vulnerable_version": "2:1.8.13-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49805?format=api", "vulnerability_id": "VCID-zz57-zmka-33ev", "summary": "The X.Org X11 library contains multiple integer overflows, which could lead\n to the execution of arbitrary code.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045" }, { "reference_url": "http://issues.foresightlinux.org/browse/FL-223", "reference_id": "", "reference_type": "", "scores": [], "url": "http://issues.foresightlinux.org/browse/FL-223" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html" }, { "reference_url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.freedesktop.org/archives/xorg-announce/2007-April/000286.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2007-0125.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-1667.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1667", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.8386", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83932", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83929", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83874", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.8389", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83915", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02066", "scoring_system": "epss", "scoring_elements": "0.83938", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02145", "scoring_system": "epss", "scoring_elements": "0.84252", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02145", "scoring_system": "epss", "scoring_elements": "0.84247", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-1667" }, { "reference_url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=231684" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1667" }, { "reference_url": "http://secunia.com/advisories/24739", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24739" }, { "reference_url": "http://secunia.com/advisories/24741", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24741" }, { "reference_url": "http://secunia.com/advisories/24745", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24745" }, { "reference_url": "http://secunia.com/advisories/24756", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24756" }, { "reference_url": "http://secunia.com/advisories/24758", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24758" }, { "reference_url": "http://secunia.com/advisories/24765", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24765" }, { "reference_url": "http://secunia.com/advisories/24771", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24771" }, { "reference_url": "http://secunia.com/advisories/24791", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24791" }, { "reference_url": "http://secunia.com/advisories/24953", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24953" }, { "reference_url": "http://secunia.com/advisories/24975", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24975" }, { "reference_url": "http://secunia.com/advisories/25004", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25004" }, { "reference_url": "http://secunia.com/advisories/25072", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25072" }, { "reference_url": "http://secunia.com/advisories/25112", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25112" }, { "reference_url": "http://secunia.com/advisories/25131", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25131" }, { "reference_url": "http://secunia.com/advisories/25305", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25305" }, { "reference_url": "http://secunia.com/advisories/25992", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/25992" }, { "reference_url": "http://secunia.com/advisories/26177", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/26177" }, { "reference_url": "http://secunia.com/advisories/30161", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/30161" }, { "reference_url": "http://secunia.com/advisories/33937", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/33937" }, { "reference_url": "http://secunia.com/advisories/36260", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/36260" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200705-06.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-200705-06.xml" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1211" }, { "reference_url": "https://issues.rpath.com/browse/RPL-1213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.rpath.com/browse/RPL-1213" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1693" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9776" }, { "reference_url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102888-1" }, { "reference_url": "http://support.apple.com/kb/HT3438", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT3438" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-176.htm" }, { "reference_url": "http://www.debian.org/security/2007/dsa-1294", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2007/dsa-1294" }, { "reference_url": "http://www.debian.org/security/2009/dsa-1858", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2009/dsa-1858" }, { "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-07.xml" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:079" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:147" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_27_x.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_27_x.html" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2007_8_sr.html" }, { "reference_url": "http://www.openbsd.org/errata39.html#021_xorg", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openbsd.org/errata39.html#021_xorg" }, { "reference_url": "http://www.openbsd.org/errata40.html#011_xorg", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openbsd.org/errata40.html#011_xorg" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0126.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0157.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0157.html" }, { "reference_url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/464686/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/archive/1/464816/100/0/threaded" }, { "reference_url": "http://www.securityfocus.com/bid/23300", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/23300" }, { "reference_url": "http://www.securitytracker.com/id?1017864", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1017864" }, { "reference_url": "http://www.ubuntu.com/usn/usn-453-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-453-1" }, { "reference_url": "http://www.ubuntu.com/usn/usn-453-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-453-2" }, { "reference_url": "http://www.ubuntu.com/usn/usn-481-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-481-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1217", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1217" }, { "reference_url": "http://www.vupen.com/english/advisories/2007/1531", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2007/1531" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=231684", "reference_id": "231684", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=231684" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045", "reference_id": "414045", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=414045" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862", "reference_id": "417862", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=417862" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1667", "reference_id": "CVE-2007-1667", "reference_type": "", "scores": [ { "value": "9.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1667" }, { "reference_url": "https://security.gentoo.org/glsa/200705-06", "reference_id": "GLSA-200705-06", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200705-06" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0125", "reference_id": "RHSA-2007:0125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0126", "reference_id": "RHSA-2007:0126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0126" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0157", "reference_id": "RHSA-2007:0157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0157" }, { "reference_url": "https://usn.ubuntu.com/453-1/", "reference_id": "USN-453-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/453-1/" }, { "reference_url": "https://usn.ubuntu.com/481-1/", "reference_id": "USN-481-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/481-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/929093?format=api", "purl": "pkg:deb/debian/libx11@2:1.0.3-7?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.3-7%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929089?format=api", "purl": "pkg:deb/debian/libx11@2:1.7.2-1%2Bdeb11u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.7.2-1%252Bdeb11u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929087?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.4-2%2Bdeb12u2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.4-2%252Bdeb12u2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929091?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.12-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.12-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/929090?format=api", "purl": "pkg:deb/debian/libx11@2:1.8.13-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.8.13-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2007-1667" ], "risk_score": 4.2, "exploitability": "0.5", "weighted_severity": "8.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zz57-zmka-33ev" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libx11@2:1.0.3-7%3Fdistro=trixie" }