Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/79366?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79366?format=api",
    "vulnerability_id": "VCID-5xtu-e6dr-97hb",
    "summary": "kernel: netfilter: nf_tables: incorrect NFT_STATEFUL_EXPR check leads to a use-after-free (write)",
    "aliases": [
        {
            "alias": "CVE-2022-1966"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371696?format=api",
            "purl": "pkg:alpm/archlinux/linux@5.18.2-1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@5.18.2-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371694?format=api",
            "purl": "pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-hardened@5.17.13.hardened1-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371748?format=api",
            "purl": "pkg:alpm/archlinux/linux-lts@5.15.45-1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@5.15.45-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371692?format=api",
            "purl": "pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.18.2.zen1-1"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371695?format=api",
            "purl": "pkg:alpm/archlinux/linux@5.18.1-1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-39b6-wnhk-1uhn"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-e1ec-jsa3-nkeq"
                },
                {
                    "vulnerability": "VCID-phz7-1zx1-r3bu"
                },
                {
                    "vulnerability": "VCID-qb79-b4zu-sufz"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux@5.18.1-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371693?format=api",
            "purl": "pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-39b6-wnhk-1uhn"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-e1ec-jsa3-nkeq"
                },
                {
                    "vulnerability": "VCID-phz7-1zx1-r3bu"
                },
                {
                    "vulnerability": "VCID-qb79-b4zu-sufz"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-hardened@5.17.12.hardened2-2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371747?format=api",
            "purl": "pkg:alpm/archlinux/linux-lts@5.15.44-1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-39b6-wnhk-1uhn"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-e1ec-jsa3-nkeq"
                },
                {
                    "vulnerability": "VCID-p9fd-1vjw-dbg4"
                },
                {
                    "vulnerability": "VCID-phz7-1zx1-r3bu"
                },
                {
                    "vulnerability": "VCID-qb79-b4zu-sufz"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-lts@5.15.44-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/371691?format=api",
            "purl": "pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-39b6-wnhk-1uhn"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-e1ec-jsa3-nkeq"
                },
                {
                    "vulnerability": "VCID-phz7-1zx1-r3bu"
                },
                {
                    "vulnerability": "VCID-qb79-b4zu-sufz"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/linux-zen@5.18.1.zen1-1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98446?format=api",
            "purl": "pkg:rpm/redhat/kernel@3.10.0-1160.71.1?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-gkac-yybb-pqdv"
                },
                {
                    "vulnerability": "VCID-qfza-xn49-hyf1"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@3.10.0-1160.71.1%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/93201?format=api",
            "purl": "pkg:rpm/redhat/kernel@4.18.0-193.87.1?arch=el8_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-3wju-yesf-fbeu"
                },
                {
                    "vulnerability": "VCID-5c6z-1ebs-wfev"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-gkac-yybb-pqdv"
                },
                {
                    "vulnerability": "VCID-qecv-tvzh-8uat"
                },
                {
                    "vulnerability": "VCID-qfza-xn49-hyf1"
                },
                {
                    "vulnerability": "VCID-qr9t-hvpr-17dd"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-193.87.1%3Farch=el8_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/91222?format=api",
            "purl": "pkg:rpm/redhat/kernel@5.14.0-70.17.1?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5c6z-1ebs-wfev"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-gkac-yybb-pqdv"
                },
                {
                    "vulnerability": "VCID-n8pj-dxe6-hkc9"
                },
                {
                    "vulnerability": "VCID-qfza-xn49-hyf1"
                },
                {
                    "vulnerability": "VCID-qr9t-hvpr-17dd"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@5.14.0-70.17.1%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98444?format=api",
            "purl": "pkg:rpm/redhat/kernel-rt@3.10.0-1160.71.1.rt56.1212?arch=el7",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-gkac-yybb-pqdv"
                },
                {
                    "vulnerability": "VCID-qfza-xn49-hyf1"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@3.10.0-1160.71.1.rt56.1212%3Farch=el7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98447?format=api",
            "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137?arch=el8_2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5c6z-1ebs-wfev"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-gkac-yybb-pqdv"
                },
                {
                    "vulnerability": "VCID-qecv-tvzh-8uat"
                },
                {
                    "vulnerability": "VCID-qfza-xn49-hyf1"
                },
                {
                    "vulnerability": "VCID-qr9t-hvpr-17dd"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-193.87.1.rt13.137%3Farch=el8_2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98443?format=api",
            "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89?arch=el9_0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-5c6z-1ebs-wfev"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-gkac-yybb-pqdv"
                },
                {
                    "vulnerability": "VCID-qfza-xn49-hyf1"
                },
                {
                    "vulnerability": "VCID-qr9t-hvpr-17dd"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-70.17.1.rt21.89%3Farch=el9_0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/98445?format=api",
            "purl": "pkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0?arch=el7_9",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-3adf-qttu-3kfd"
                },
                {
                    "vulnerability": "VCID-5xtu-e6dr-97hb"
                },
                {
                    "vulnerability": "VCID-gkac-yybb-pqdv"
                },
                {
                    "vulnerability": "VCID-xd6j-x83x-r3gn"
                },
                {
                    "vulnerability": "VCID-ybfq-unp3-dbav"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/redhat-virtualization-host@4.3.23-20220622.0%3Farch=el7_9"
        }
    ],
    "references": [
        {
            "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1966.json"
        },
        {
            "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "7.8",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
        },
        {
            "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146",
            "reference_id": "2093146",
            "reference_type": "",
            "scores": [],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2093146"
        },
        {
            "reference_url": "https://security.archlinux.org/AVG-2751",
            "reference_id": "AVG-2751",
            "reference_type": "",
            "scores": [
                {
                    "value": "High",
                    "scoring_system": "archlinux",
                    "scoring_elements": ""
                }
            ],
            "url": "https://security.archlinux.org/AVG-2751"
        },
        {
            "reference_url": "https://security.archlinux.org/AVG-2752",
            "reference_id": "AVG-2752",
            "reference_type": "",
            "scores": [
                {
                    "value": "High",
                    "scoring_system": "archlinux",
                    "scoring_elements": ""
                }
            ],
            "url": "https://security.archlinux.org/AVG-2752"
        },
        {
            "reference_url": "https://security.archlinux.org/AVG-2753",
            "reference_id": "AVG-2753",
            "reference_type": "",
            "scores": [
                {
                    "value": "High",
                    "scoring_system": "archlinux",
                    "scoring_elements": ""
                }
            ],
            "url": "https://security.archlinux.org/AVG-2753"
        },
        {
            "reference_url": "https://security.archlinux.org/AVG-2754",
            "reference_id": "AVG-2754",
            "reference_type": "",
            "scores": [
                {
                    "value": "High",
                    "scoring_system": "archlinux",
                    "scoring_elements": ""
                }
            ],
            "url": "https://security.archlinux.org/AVG-2754"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5214",
            "reference_id": "RHSA-2022:5214",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5214"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5216",
            "reference_id": "RHSA-2022:5216",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5216"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5220",
            "reference_id": "RHSA-2022:5220",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5220"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5224",
            "reference_id": "RHSA-2022:5224",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5224"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5232",
            "reference_id": "RHSA-2022:5232",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5232"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5236",
            "reference_id": "RHSA-2022:5236",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5236"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5249",
            "reference_id": "RHSA-2022:5249",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5249"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5267",
            "reference_id": "RHSA-2022:5267",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5267"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5439",
            "reference_id": "RHSA-2022:5439",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5439"
        },
        {
            "reference_url": "https://access.redhat.com/errata/RHSA-2022:5476",
            "reference_id": "RHSA-2022:5476",
            "reference_type": "",
            "scores": [],
            "url": "https://access.redhat.com/errata/RHSA-2022:5476"
        },
        {
            "reference_url": "https://usn.ubuntu.com/5465-1/",
            "reference_id": "USN-5465-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/5465-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/5466-1/",
            "reference_id": "USN-5466-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/5466-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/5467-1/",
            "reference_id": "USN-5467-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/5467-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/5468-1/",
            "reference_id": "USN-5468-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/5468-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/5469-1/",
            "reference_id": "USN-5469-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/5469-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/5470-1/",
            "reference_id": "USN-5470-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/5470-1/"
        },
        {
            "reference_url": "https://usn.ubuntu.com/5471-1/",
            "reference_id": "USN-5471-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/5471-1/"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 416,
            "name": "Use After Free",
            "description": "Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code."
        }
    ],
    "exploits": [],
    "severity_range_score": "7.0 - 8.9",
    "exploitability": "0.5",
    "weighted_severity": "8.0",
    "risk_score": 4.0,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5xtu-e6dr-97hb"
}