Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/127808?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/127808?format=api", "purl": "pkg:rpm/redhat/libtiff@3.5.7-34?arch=el3", "type": "rpm", "namespace": "redhat", "name": "libtiff", "version": "3.5.7-34", "qualifiers": { "arch": "el3" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47116?format=api", "vulnerability_id": "VCID-5d2c-qx3t-97b9", "summary": "Multiple vulnerabilities in libTIFF could result in execution of\n arbitrary code or Denial of Service.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00001.html" }, { "reference_url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043769.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043769.html" }, { "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043835.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-July/043835.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html" }, { "reference_url": "http://marc.info/?l=oss-security&m=127731610612908&w=2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://marc.info/?l=oss-security&m=127731610612908&w=2" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1411.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-1411.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1411", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73159", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.72989", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.72999", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.72995", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73032", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73046", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.7307", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73049", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73043", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73087", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73096", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73089", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73127", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.7314", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73139", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00745", "scoring_system": "epss", "scoring_elements": "0.73133", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-1411" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1411", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1411" }, { "reference_url": "http://secunia.com/advisories/40181", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40181" }, { "reference_url": "http://secunia.com/advisories/40196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40196" }, { "reference_url": "http://secunia.com/advisories/40220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40220" }, { "reference_url": "http://secunia.com/advisories/40381", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40381" }, { "reference_url": "http://secunia.com/advisories/40478", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40478" }, { "reference_url": "http://secunia.com/advisories/40527", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40527" }, { "reference_url": "http://secunia.com/advisories/40536", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40536" }, { "reference_url": "http://secunia.com/advisories/50726", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50726" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201209-02.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201209-02.xml" }, { "reference_url": "http://securitytracker.com/id?1024103", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1024103" }, { "reference_url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424", "reference_id": "", "reference_type": "", "scores": [], "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.596424" }, { "reference_url": "http://support.apple.com/kb/HT4188", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4188" }, { "reference_url": "http://support.apple.com/kb/HT4196", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4196" }, { "reference_url": "http://support.apple.com/kb/HT4220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.apple.com/kb/HT4220" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0519.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0519.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0520.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0520.html" }, { "reference_url": "http://www.remotesensing.org/libtiff/v3.9.3.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.remotesensing.org/libtiff/v3.9.3.html" }, { "reference_url": "http://www.securityfocus.com/bid/40823", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/40823" }, { "reference_url": "http://www.ubuntu.com/usn/USN-954-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-954-1" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1435", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1435" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1481", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1481" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1512", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1512" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1638", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1638" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1731", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1731" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1761", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1761" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=592361", "reference_id": "592361", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=592361" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1411", "reference_id": "CVE-2010-1411", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1411" }, { "reference_url": "https://security.gentoo.org/glsa/201209-02", "reference_id": "GLSA-201209-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201209-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0519", "reference_id": "RHSA-2010:0519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0520", "reference_id": "RHSA-2010:0520", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0520" }, { "reference_url": "https://usn.ubuntu.com/954-1/", "reference_id": "USN-954-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/954-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-1411" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5d2c-qx3t-97b9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87747?format=api", "vulnerability_id": "VCID-9p5z-qwmf-kyb1", "summary": "libtiff: crash when reading image with not configured compression", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2598.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2010-2598.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2598", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69129", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.68946", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.68964", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.68984", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.68963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69013", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69033", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69055", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.6904", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69011", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69051", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.6906", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69091", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69099", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69106", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00584", "scoring_system": "epss", "scoring_elements": "0.69086", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2010-2598" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=583081", "reference_id": "", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=583081" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2598", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2598" }, { "reference_url": "http://secunia.com/advisories/40536", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/40536" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2010-0520.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2010-0520.html" }, { "reference_url": "http://www.vupen.com/english/advisories/2010/1761", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2010/1761" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=610786", "reference_id": "610786", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=610786" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3:ga:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:as:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3:ga:as:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:as:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:desktop:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3:ga:desktop:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:desktop:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:es:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3:ga:es:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:es:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:ws:*:*:*:*:*", "reference_id": "cpe:2.3:o:redhat:enterprise_linux:3:ga:ws:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:3:ga:ws:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2598", "reference_id": "CVE-2010-2598", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0520", "reference_id": "RHSA-2010:0520", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0520" }, { "reference_url": "https://usn.ubuntu.com/1085-1/", "reference_id": "USN-1085-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1085-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2010-2598" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9p5z-qwmf-kyb1" } ], "fixing_vulnerabilities": [], "risk_score": "3.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/libtiff@3.5.7-34%3Farch=el3" }