Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/77733?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/77733?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@0.99.8", "type": "ebuild", "namespace": "net-analyzer", "name": "wireshark", "version": "0.99.8", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.0.0", "latest_non_vulnerable_version": "4.0.11", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49050?format=api", "vulnerability_id": "VCID-1zr4-s7bn-dqb6", "summary": "Multiple Denial of Service vulnerabilities have been discovered in\n Wireshark.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1070.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1070.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1070", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78393", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78399", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.7843", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78414", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.7844", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78445", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.7847", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78452", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78473", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78472", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78467", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.785", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78507", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78523", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78537", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01144", "scoring_system": "epss", "scoring_elements": "0.78561", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1070" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1070" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=435481", "reference_id": "435481", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435481" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469488", "reference_id": "469488", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469488" }, { "reference_url": "https://security.gentoo.org/glsa/200803-32", "reference_id": "GLSA-200803-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0890", "reference_id": "RHSA-2008:0890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0890" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77733?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@0.99.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@0.99.8" } ], "aliases": [ "CVE-2008-1070" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1zr4-s7bn-dqb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49051?format=api", "vulnerability_id": "VCID-9x4k-5vrn-jydd", "summary": "Multiple Denial of Service vulnerabilities have been discovered in\n Wireshark.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1071.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1071.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1071", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77902", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77913", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7794", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77944", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77971", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77955", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77953", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77988", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77987", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77981", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78013", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78021", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78034", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78044", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78071", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1071" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1071" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=435482", "reference_id": "435482", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435482" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469488", "reference_id": "469488", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469488" }, { "reference_url": "https://security.gentoo.org/glsa/200803-32", "reference_id": "GLSA-200803-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0890", "reference_id": "RHSA-2008:0890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0890" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77733?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@0.99.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@0.99.8" } ], "aliases": [ "CVE-2008-1071" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9x4k-5vrn-jydd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49052?format=api", "vulnerability_id": "VCID-ja1a-5k9d-mqcc", "summary": "Multiple Denial of Service vulnerabilities have been discovered in\n Wireshark.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1072.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1072.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1072", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29211", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29287", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29337", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29149", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29213", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29253", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29258", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29159", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29186", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29162", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.29113", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28992", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28881", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28809", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28659", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00109", "scoring_system": "epss", "scoring_elements": "0.28719", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1072" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1072" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=435483", "reference_id": "435483", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=435483" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469488", "reference_id": "469488", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=469488" }, { "reference_url": "https://security.gentoo.org/glsa/200803-32", "reference_id": "GLSA-200803-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200803-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2008:0890", "reference_id": "RHSA-2008:0890", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2008:0890" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77733?format=api", "purl": "pkg:ebuild/net-analyzer/wireshark@0.99.8", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@0.99.8" } ], "aliases": [ "CVE-2008-1072" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ja1a-5k9d-mqcc" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-analyzer/wireshark@0.99.8" }