Lookup for vulnerable packages by Package URL.

GET /api/packages/113190?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/113190?format=api",
    "purl": "pkg:rpm/redhat/docker@2:1.12.5-14?arch=el7",
    "type": "rpm",
    "namespace": "redhat",
    "name": "docker",
    "version": "2:1.12.5-14",
    "qualifiers": {
        "arch": "el7"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/36505?format=api",
            "vulnerability_id": "VCID-165g-hgmx-nybk",
            "summary": "Information Exposure in RunC\nRunC allowed additional container processes via 'runc exec' to be ptraced by the pid 1 of the container.  This allows the main processes of the container, if running as root, to gain access to file-descriptors of these new processes during the initialization and can lead to container escapes or modification of runC state before the process is fully placed inside the container.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0116.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0116.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0123.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0123.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0127.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0127.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9962.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9962.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/vulnerabilities/cve-2016-9962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/vulnerabilities/cve-2016-9962"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32205",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31612",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31541",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31688",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3177",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31897",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32063",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3209",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32112",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32079",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3211",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32149",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32117",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32067",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32242",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32078",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-9962"
                },
                {
                    "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.suse.com/show_bug.cgi?id=1012568#c6"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9962"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2017/Jan/21",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2017/Jan/21"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2017/Jan/29",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2017/Jan/29"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:S/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/docker/docker/releases/tag/v1.12.6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/docker/docker/releases/tag/v1.12.6"
                },
                {
                    "reference_url": "https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/opencontainers/runc/commit/50a19c6ff828c58e5dab13830bd3dacde268afe5"
                },
                {
                    "reference_url": "https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/opencontainers/runc/commit/5d93fed3d27f1e2bab58bad13b180a7a81d0b378"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BQAXJMMLRU7DD2IMG47SR2K4BOFFG7FZ"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FINGBFMIXBG6B6ZWYH3TMRP5V3PDBNXR"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UVM7FCOQMPKOFLDTUYSS4ES76DDM56VP"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WUQ3MQNEL5IBZZLMLR72Q4YDCL2SCKRK"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-9962"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-34",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-34"
                },
                {
                    "reference_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9962"
                },
                {
                    "reference_url": "http://www.securityfocus.com/archive/1/540001/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/archive/1/540001/100/0/threaded"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/95361",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/95361"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409531",
                    "reference_id": "1409531",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1409531"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850951",
                    "reference_id": "850951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850951"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850952",
                    "reference_id": "850952",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850952"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201701-19",
                    "reference_id": "ASA-201701-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201701-19"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201805-11",
                    "reference_id": "ASA-201805-11",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201805-11"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-133",
                    "reference_id": "AVG-133",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-133"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-134",
                    "reference_id": "AVG-134",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-134"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0116",
                    "reference_id": "RHSA-2017:0116",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0116"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0123",
                    "reference_id": "RHSA-2017:0123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0123"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0127",
                    "reference_id": "RHSA-2017:0127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0127"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2016-9962",
                "GHSA-gp4j-w3vj-7299"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-165g-hgmx-nybk"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/docker@2:1.12.5-14%3Farch=el7"
}