Lookup for vulnerable packages by Package URL.

GET /api/packages/467827?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/467827?format=api",
    "purl": "pkg:apk/alpine/postgresql16@16.5-r0?arch=riscv64&distroversion=v3.21&reponame=main",
    "type": "apk",
    "namespace": "alpine",
    "name": "postgresql16",
    "version": "16.5-r0",
    "qualifiers": {
        "arch": "riscv64",
        "distroversion": "v3.21",
        "reponame": "main"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "16.8-r0",
    "latest_non_vulnerable_version": "16.13-r0",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3507?format=api",
            "vulnerability_id": "VCID-66hr-98m2-a3gc",
            "summary": "PostgreSQL libpq retains an error message from man-in-the-middlemore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10977.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10977.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57034",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57123",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57102",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57033",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57052",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57077",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.571",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57127",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57129",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57141",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5712",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00345",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57128",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10977"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10977"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2024-10977/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N']"
                        },
                        {
                            "value": "3.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:39Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2024-10977/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326258",
                    "reference_id": "2326258",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326258"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-12",
                    "reference_id": "GLSA-202412-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-12"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7132-1/",
                    "reference_id": "USN-7132-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7132-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7358-1/",
                    "reference_id": "USN-7358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/467827?format=api",
                    "purl": "pkg:apk/alpine/postgresql16@16.5-r0?arch=riscv64&distroversion=v3.21&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.5-r0%3Farch=riscv64&distroversion=v3.21&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2024-10977"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-66hr-98m2-a3gc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3506?format=api",
            "vulnerability_id": "VCID-8da2-zhsq-j7c4",
            "summary": "PostgreSQL SET ROLE, SET SESSION AUTHORIZATION reset to wrong user IDmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10978.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10978.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10978",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6993",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69887",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69867",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69918",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69927",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69786",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69802",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69778",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69826",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69841",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69865",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6985",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69836",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00613",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69877",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10978"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10978"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2024-10978/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:38Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2024-10978/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326251",
                    "reference_id": "2326251",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326251"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-12",
                    "reference_id": "GLSA-202412-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10785",
                    "reference_id": "RHSA-2024:10785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10787",
                    "reference_id": "RHSA-2024:10787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10787"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10788",
                    "reference_id": "RHSA-2024:10788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10788"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10791",
                    "reference_id": "RHSA-2024:10791",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10830",
                    "reference_id": "RHSA-2024:10830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10830"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10831",
                    "reference_id": "RHSA-2024:10831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10831"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10832",
                    "reference_id": "RHSA-2024:10832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10832"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7132-1/",
                    "reference_id": "USN-7132-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7132-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7358-1/",
                    "reference_id": "USN-7358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/467827?format=api",
                    "purl": "pkg:apk/alpine/postgresql16@16.5-r0?arch=riscv64&distroversion=v3.21&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.5-r0%3Farch=riscv64&distroversion=v3.21&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2024-10978"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8da2-zhsq-j7c4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3508?format=api",
            "vulnerability_id": "VCID-rac3-kfb9-efgf",
            "summary": "PostgreSQL row security below e.g. subqueries disregards user ID changesmore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10976.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10976.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78062",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78063",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78028",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77979",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78008",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7799",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78017",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78021",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7803",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78048",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78389",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78333",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78366",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01129",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78372",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10976"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10976"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2024-10976/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N']"
                        },
                        {
                            "value": "4.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-14T18:53:41Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2024-10976/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326263",
                    "reference_id": "2326263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326263"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-12",
                    "reference_id": "GLSA-202412-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10785",
                    "reference_id": "RHSA-2024:10785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10787",
                    "reference_id": "RHSA-2024:10787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10787"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10788",
                    "reference_id": "RHSA-2024:10788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10788"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10791",
                    "reference_id": "RHSA-2024:10791",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10830",
                    "reference_id": "RHSA-2024:10830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10830"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10831",
                    "reference_id": "RHSA-2024:10831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10831"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10832",
                    "reference_id": "RHSA-2024:10832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10832"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7132-1/",
                    "reference_id": "USN-7132-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7132-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7358-1/",
                    "reference_id": "USN-7358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/467827?format=api",
                    "purl": "pkg:apk/alpine/postgresql16@16.5-r0?arch=riscv64&distroversion=v3.21&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.5-r0%3Farch=riscv64&distroversion=v3.21&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2024-10976"
            ],
            "risk_score": 1.9,
            "exploitability": "0.5",
            "weighted_severity": "3.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rac3-kfb9-efgf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/3505?format=api",
            "vulnerability_id": "VCID-wxxg-2f53-w3ey",
            "summary": "PostgreSQL PL/Perl environment variable changes execute arbitrary codemore details",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10979.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-10979.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10979",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91399",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91392",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9139",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91402",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.914",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91321",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91332",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91339",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91351",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91358",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91365",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06857",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91367",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-10979"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10979"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.postgresql.org/about/news/postgresql-171-165-159-1414-1317-and-1221-released-2955/"
                },
                {
                    "reference_url": "https://www.postgresql.org/support/security/CVE-2024-10979/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "['AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H']"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-14T14:32:36Z/"
                        }
                    ],
                    "url": "https://www.postgresql.org/support/security/CVE-2024-10979/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326253",
                    "reference_id": "2326253",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326253"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202412-12",
                    "reference_id": "GLSA-202412-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202412-12"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10593",
                    "reference_id": "RHSA-2024:10593",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10593"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10595",
                    "reference_id": "RHSA-2024:10595",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10595"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10677",
                    "reference_id": "RHSA-2024:10677",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10677"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10705",
                    "reference_id": "RHSA-2024:10705",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10705"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10736",
                    "reference_id": "RHSA-2024:10736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10736"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10739",
                    "reference_id": "RHSA-2024:10739",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10739"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10750",
                    "reference_id": "RHSA-2024:10750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10750"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10785",
                    "reference_id": "RHSA-2024:10785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10785"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10787",
                    "reference_id": "RHSA-2024:10787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10787"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10788",
                    "reference_id": "RHSA-2024:10788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10788"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10789",
                    "reference_id": "RHSA-2024:10789",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10789"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10791",
                    "reference_id": "RHSA-2024:10791",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10791"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10800",
                    "reference_id": "RHSA-2024:10800",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10800"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10807",
                    "reference_id": "RHSA-2024:10807",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10807"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10827",
                    "reference_id": "RHSA-2024:10827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10827"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10830",
                    "reference_id": "RHSA-2024:10830",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10830"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10831",
                    "reference_id": "RHSA-2024:10831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10831"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10832",
                    "reference_id": "RHSA-2024:10832",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10832"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10846",
                    "reference_id": "RHSA-2024:10846",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10846"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10851",
                    "reference_id": "RHSA-2024:10851",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10851"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10879",
                    "reference_id": "RHSA-2024:10879",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10879"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:10882",
                    "reference_id": "RHSA-2024:10882",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:10882"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7132-1/",
                    "reference_id": "USN-7132-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7132-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7358-1/",
                    "reference_id": "USN-7358-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7358-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/467827?format=api",
                    "purl": "pkg:apk/alpine/postgresql16@16.5-r0?arch=riscv64&distroversion=v3.21&reponame=main",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.5-r0%3Farch=riscv64&distroversion=v3.21&reponame=main"
                }
            ],
            "aliases": [
                "CVE-2024-10979"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "7.9",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxxg-2f53-w3ey"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/postgresql16@16.5-r0%3Farch=riscv64&distroversion=v3.21&reponame=main"
}