Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/384?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/384?format=api", "purl": "pkg:generic/postgresql@7.4.14", "type": "generic", "namespace": "", "name": "postgresql", "version": "7.4.14", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "7.4.16", "latest_non_vulnerable_version": "18.2.0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3587?format=api", "vulnerability_id": "VCID-4tyx-g9kz-y3fq", "summary": "A bug in the coercion of unknown literals to ANYARRAY can cause a denial of service. A valid login is required to exploit this vulnerability.more details", "references": [ { "reference_url": "http://projects.commandprompt.com/public/pgsql/changeset/26457", "reference_id": "", "reference_type": "", "scores": [], "url": "http://projects.commandprompt.com/public/pgsql/changeset/26457" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5541.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-5541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82296", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.8215", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82163", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82184", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82181", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82207", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82234", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82226", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.8222", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82257", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82258", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82279", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01689", "scoring_system": "epss", "scoring_elements": "0.82291", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-5541" }, { "reference_url": "http://secunia.com/advisories/22562", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22562" }, { "reference_url": "http://secunia.com/advisories/22584", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22584" }, { "reference_url": "http://secunia.com/advisories/22606", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22606" }, { "reference_url": "http://secunia.com/advisories/22636", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/22636" }, { "reference_url": "http://secunia.com/advisories/23048", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23048" }, { "reference_url": "http://secunia.com/advisories/23132", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/23132" }, { "reference_url": "http://secunia.com/advisories/24577", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/24577" }, { "reference_url": "http://securitytracker.com/id?1017115", "reference_id": "", "reference_type": "", "scores": [], "url": "http://securitytracker.com/id?1017115" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10905", "reference_id": "", "reference_type": "", "scores": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10905" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-117.htm" }, { "reference_url": "http://support.novell.com/techcenter/psdb/59650c03a8bc5ae310cd7898bd106ad2.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://support.novell.com/techcenter/psdb/59650c03a8bc5ae310cd7898bd106ad2.html" }, { "reference_url": "https://www.postgresql.org/support/security/CVE-2006-5541/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.postgresql.org/support/security/CVE-2006-5541/" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:194", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:194" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2006_27_sr.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.novell.com/linux/security/advisories/2006_27_sr.html" }, { "reference_url": "http://www.postgresql.org/about/news.664", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.postgresql.org/about/news.664" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0067.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0067.html" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2007-0068.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.redhat.com/support/errata/RHSA-2007-0068.html" }, { "reference_url": "http://www.securityfocus.com/bid/20717", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/20717" }, { "reference_url": "http://www.trustix.org/errata/2006/0059/", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.trustix.org/errata/2006/0059/" }, { "reference_url": "http://www.ubuntu.com/usn/usn-369-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-369-1" }, { "reference_url": "http://www.ubuntu.com/usn/usn-369-2", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/usn-369-2" }, { "reference_url": "http://www.vupen.com/english/advisories/2006/4182", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.vupen.com/english/advisories/2006/4182" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618218", "reference_id": "1618218", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618218" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5541", "reference_id": "CVE-2006-5541", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:N/I:N/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0067", "reference_id": "RHSA-2007:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2007:0068", "reference_id": "RHSA-2007:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2007:0068" }, { "reference_url": "https://usn.ubuntu.com/369-2/", "reference_id": "USN-369-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/369-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/384?format=api", "purl": "pkg:generic/postgresql@7.4.14", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.14" }, { "url": "http://public2.vulnerablecode.io/api/packages/383?format=api", "purl": "pkg:generic/postgresql@8.0.9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.0.9" }, { "url": "http://public2.vulnerablecode.io/api/packages/382?format=api", "purl": "pkg:generic/postgresql@8.1.5", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@8.1.5" } ], "aliases": [ "CVE-2006-5541" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4tyx-g9kz-y3fq" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:generic/postgresql@7.4.14" }