Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/933050?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/933050?format=api", "purl": "pkg:deb/debian/ntp@1:4.2.8p4%2Bdfsg-3?distro=bullseye", "type": "deb", "namespace": "debian", "name": "ntp", "version": "1:4.2.8p4+dfsg-3", "qualifiers": { "distro": "bullseye" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1:4.2.8p7+dfsg-1", "latest_non_vulnerable_version": "1:4.2.8p15+dfsg-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48828?format=api", "vulnerability_id": "VCID-2x34-cp4t-zfg2", "summary": "Multiple vulnerabilities have been found in NTP, the worst of which\n could lead to Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7705.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7705.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7705", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96713", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96722", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96728", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96736", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96737", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96741", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96743", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96749", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96754", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96756", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.31029", "scoring_system": "epss", "scoring_elements": "0.96755", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7705" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274184", "reference_id": "1274184", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274184" }, { "reference_url": "https://security.gentoo.org/glsa/201607-15", "reference_id": "GLSA-201607-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-15" }, { "reference_url": "https://usn.ubuntu.com/2783-1/", "reference_id": "USN-2783-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2783-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933050?format=api", "purl": "pkg:deb/debian/ntp@1:4.2.8p4%2Bdfsg-3?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p4%252Bdfsg-3%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/933036?format=api", "purl": "pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2015-7705" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2x34-cp4t-zfg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48827?format=api", "vulnerability_id": "VCID-vayx-vnuq-6bej", "summary": "Multiple vulnerabilities have been found in NTP, the worst of which\n could lead to Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7704.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7704.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7704", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94281", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.9429", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94301", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94302", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94312", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94316", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94321", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94323", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94338", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94343", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94342", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.13941", "scoring_system": "epss", "scoring_elements": "0.94346", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070", "reference_id": "1271070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1271070" }, { "reference_url": "https://security.gentoo.org/glsa/201607-15", "reference_id": "GLSA-201607-15", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201607-15" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:1930", "reference_id": "RHSA-2015:1930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:1930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:2520", "reference_id": "RHSA-2015:2520", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:2520" }, { "reference_url": "https://usn.ubuntu.com/2783-1/", "reference_id": "USN-2783-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2783-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933050?format=api", "purl": "pkg:deb/debian/ntp@1:4.2.8p4%2Bdfsg-3?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p4%252Bdfsg-3%3Fdistro=bullseye" }, { "url": "http://public2.vulnerablecode.io/api/packages/933036?format=api", "purl": "pkg:deb/debian/ntp@1:4.2.8p15%2Bdfsg-1?distro=bullseye", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p15%252Bdfsg-1%3Fdistro=bullseye" } ], "aliases": [ "CVE-2015-7704" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vayx-vnuq-6bej" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/ntp@1:4.2.8p4%252Bdfsg-3%3Fdistro=bullseye" }