Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/941503?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/941503?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.2%2Bds-1?distro=sid", "type": "deb", "namespace": "debian", "name": "trafficserver", "version": "9.2.2+ds-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "9.2.3+ds-1", "latest_non_vulnerable_version": "9.2.5+ds-0+deb12u4", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95550?format=api", "vulnerability_id": "VCID-4men-293s-3bhn", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-33934", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.5319", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53214", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53182", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53235", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53229", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.5328", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53266", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53248", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53286", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.004", "scoring_system": "epss", "scoring_elements": "0.60768", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.004", "scoring_system": "epss", "scoring_elements": "0.60753", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-33934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430", "reference_id": "1043430", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/", "reference_id": "BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/" }, { "reference_url": "https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc", "reference_id": "jsl6dfdgs1mjjo1mbtyflyjr7xftswhc", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/" } ], "url": "https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html", "reference_id": "msg00042.html", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:29:05Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941502?format=api", "purl": "pkg:deb/debian/trafficserver@8.1.9%2Bds-1~deb11u1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.9%252Bds-1~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941472?format=api", "purl": "pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4738-xk8n-hbac" }, { "vulnerability": "VCID-4hs3-be7k-9qe7" }, { "vulnerability": "VCID-4uhe-mtbx-nfdu" }, { "vulnerability": "VCID-5e1r-3jec-tkhp" }, { "vulnerability": "VCID-c62p-6ghw-j3dv" }, { "vulnerability": "VCID-eay7-63um-43e9" }, { "vulnerability": "VCID-kjah-am9e-xkev" }, { "vulnerability": "VCID-tevw-8dcp-yfh6" }, { "vulnerability": "VCID-ww3t-p3pq-gkhy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941503?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.2%2Bds-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.2%252Bds-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941501?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.3%2Bds-1%2Bdeb12u1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.3%252Bds-1%252Bdeb12u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941470?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941473?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4738-xk8n-hbac" }, { "vulnerability": "VCID-4hs3-be7k-9qe7" }, { "vulnerability": "VCID-4uhe-mtbx-nfdu" }, { "vulnerability": "VCID-5e1r-3jec-tkhp" }, { "vulnerability": "VCID-c62p-6ghw-j3dv" }, { "vulnerability": "VCID-eay7-63um-43e9" }, { "vulnerability": "VCID-jabw-thzt-63bb" }, { "vulnerability": "VCID-kjah-am9e-xkev" }, { "vulnerability": "VCID-rcdg-j23x-xfbn" }, { "vulnerability": "VCID-tevw-8dcp-yfh6" }, { "vulnerability": "VCID-ww3t-p3pq-gkhy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-1%3Fdistro=sid" } ], "aliases": [ "CVE-2023-33934" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4men-293s-3bhn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/95323?format=api", "vulnerability_id": "VCID-u5qg-vszr-9ye2", "summary": "security update", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47185", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58494", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58495", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58502", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58519", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58499", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58511", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58516", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.5845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58469", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00364", "scoring_system": "epss", "scoring_elements": "0.58443", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-47185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33934" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41752" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430", "reference_id": "1043430", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1043430" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/", "reference_id": "BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/" }, { "reference_url": "https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc", "reference_id": "jsl6dfdgs1mjjo1mbtyflyjr7xftswhc", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/" } ], "url": "https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html", "reference_id": "msg00042.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-01T18:22:26Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00042.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/941502?format=api", "purl": "pkg:deb/debian/trafficserver@8.1.9%2Bds-1~deb11u1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.9%252Bds-1~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941472?format=api", "purl": "pkg:deb/debian/trafficserver@8.1.10%2Bds-1~deb11u1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4738-xk8n-hbac" }, { "vulnerability": "VCID-4hs3-be7k-9qe7" }, { "vulnerability": "VCID-4uhe-mtbx-nfdu" }, { "vulnerability": "VCID-5e1r-3jec-tkhp" }, { "vulnerability": "VCID-c62p-6ghw-j3dv" }, { "vulnerability": "VCID-eay7-63um-43e9" }, { "vulnerability": "VCID-kjah-am9e-xkev" }, { "vulnerability": "VCID-tevw-8dcp-yfh6" }, { "vulnerability": "VCID-ww3t-p3pq-gkhy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@8.1.10%252Bds-1~deb11u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941503?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.2%2Bds-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.2%252Bds-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941501?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.3%2Bds-1%2Bdeb12u1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.3%252Bds-1%252Bdeb12u1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941470?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.5%2Bds-0%2Bdeb12u3?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-0%252Bdeb12u3%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/941473?format=api", "purl": "pkg:deb/debian/trafficserver@9.2.5%2Bds-1?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-4738-xk8n-hbac" }, { "vulnerability": "VCID-4hs3-be7k-9qe7" }, { "vulnerability": "VCID-4uhe-mtbx-nfdu" }, { "vulnerability": "VCID-5e1r-3jec-tkhp" }, { "vulnerability": "VCID-c62p-6ghw-j3dv" }, { "vulnerability": "VCID-eay7-63um-43e9" }, { "vulnerability": "VCID-jabw-thzt-63bb" }, { "vulnerability": "VCID-kjah-am9e-xkev" }, { "vulnerability": "VCID-rcdg-j23x-xfbn" }, { "vulnerability": "VCID-tevw-8dcp-yfh6" }, { "vulnerability": "VCID-ww3t-p3pq-gkhy" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.5%252Bds-1%3Fdistro=sid" } ], "aliases": [ "CVE-2022-47185" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u5qg-vszr-9ye2" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/trafficserver@9.2.2%252Bds-1%3Fdistro=sid" }