Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/944004?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/944004?format=api", "purl": "pkg:deb/debian/zoneminder@1.25.0-4?distro=trixie", "type": "deb", "namespace": "debian", "name": "zoneminder", "version": "1.25.0-4", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.30.4+dfsg-1", "latest_non_vulnerable_version": "1.36.37+dfsg1-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/92453?format=api", "vulnerability_id": "VCID-tj5u-pm5u-4ug6", "summary": "includes/functions.php in ZoneMinder Video Server 1.24.0, 1.25.0, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) runState parameter in the packageControl function; or (2) key or (3) command parameter in the setDeviceStatusX10 function.", "references": [ { "reference_url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910", "reference_id": "", "reference_type": "", "scores": [], "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910" }, { "reference_url": "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://itsecuritysolutions.org/2013-01-22-ZoneMinder-Video-Server-arbitrary-command-execution-vulnerability/" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0232", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99028", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99012", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99013", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99018", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99019", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.9902", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99024", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99025", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.7823", "scoring_system": "epss", "scoring_elements": "0.99026", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-0232" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0232", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0232" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2640", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2640" }, { "reference_url": "http://www.exploit-db.com/exploits/24310", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.exploit-db.com/exploits/24310" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2013/01/28/2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2013/01/28/2" }, { "reference_url": "http://www.osvdb.org/89529", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/89529" }, { "reference_url": "http://www.zoneminder.com/forums/viewtopic.php?f=29&t=20771", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.zoneminder.com/forums/viewtopic.php?f=29&t=20771" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910", "reference_id": "698910", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=698910" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.24.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.24.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.25.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:zoneminder:zoneminder:1.25.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:zoneminder:zoneminder:1.25.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0232", "reference_id": "CVE-2013-0232", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-0232" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/24310.rb", "reference_id": "OSVDB-89529;CVE-2013-0332;CVE-2013-0232", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/unix/remote/24310.rb" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/944004?format=api", "purl": "pkg:deb/debian/zoneminder@1.25.0-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.25.0-4%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943998?format=api", "purl": "pkg:deb/debian/zoneminder@1.34.23-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3xuk-942c-kkbf" }, { "vulnerability": "VCID-4mfm-zzrx-6ffb" }, { "vulnerability": "VCID-4qtk-7myx-vfcd" }, { "vulnerability": "VCID-7vc9-wfjb-t3ba" }, { "vulnerability": "VCID-7x51-uyq2-9qax" }, { "vulnerability": "VCID-95ub-6q5w-p3cm" }, { "vulnerability": "VCID-9kh5-715y-pud4" }, { "vulnerability": "VCID-d117-rhnc-rkhf" }, { "vulnerability": "VCID-fyy1-fwys-xkbj" }, { "vulnerability": "VCID-j283-1m9p-13hn" }, { "vulnerability": "VCID-jukn-h868-5ugm" }, { "vulnerability": "VCID-kk5d-y2z8-r3g2" }, { "vulnerability": "VCID-mdkd-vmcp-afa8" }, { "vulnerability": "VCID-mk5h-586t-pyga" }, { "vulnerability": "VCID-n8y3-5fb9-kucb" }, { "vulnerability": "VCID-tyu6-8h17-8yh5" }, { "vulnerability": "VCID-uybk-r4q9-gyac" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.34.23-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943996?format=api", "purl": "pkg:deb/debian/zoneminder@1.36.33%2Bdfsg1-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-3xuk-942c-kkbf" }, { "vulnerability": "VCID-4mfm-zzrx-6ffb" }, { "vulnerability": "VCID-7x51-uyq2-9qax" }, { "vulnerability": "VCID-mdkd-vmcp-afa8" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.36.33%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/944000?format=api", "purl": "pkg:deb/debian/zoneminder@1.36.35%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.36.35%252Bdfsg1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943999?format=api", "purl": "pkg:deb/debian/zoneminder@1.36.37%2Bdfsg1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.36.37%252Bdfsg1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-0232" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tj5u-pm5u-4ug6" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/zoneminder@1.25.0-4%3Fdistro=trixie" }