Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/85340?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/85340?format=api", "purl": "pkg:ebuild/net-print/cups@1.3.10", "type": "ebuild", "namespace": "net-print", "name": "cups", "version": "1.3.10", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "1.4.8-r1", "latest_non_vulnerable_version": "3.01-r2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60450?format=api", "vulnerability_id": "VCID-4he8-q3nc-3bf7", "summary": "Multiple errors in CUPS might allow for the remote execution of arbitrary\n code or DNS rebinding attacks.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0163.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0163.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0163", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89611", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89614", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89628", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89629", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89645", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89651", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89658", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89656", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.8965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.8966", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89676", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89678", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89677", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89689", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89706", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89718", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89713", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89723", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0495", "scoring_system": "epss", "scoring_elements": "0.89742", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0163" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490596", "reference_id": "490596", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490596" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0428", "reference_id": "RHSA-2009:0428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://usn.ubuntu.com/760-1/", "reference_id": "USN-760-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/760-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85340?format=api", "purl": "pkg:ebuild/net-print/cups@1.3.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.3.10" } ], "aliases": [ "CVE-2009-0163" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4he8-q3nc-3bf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31225?format=api", "vulnerability_id": "VCID-ctb2-8h4y-vybd", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0166.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8988", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89883", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89895", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89916", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89922", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89927", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89934", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89936", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89931", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89947", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89946", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89944", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89958", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89973", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89985", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.8998", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.89988", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.0519", "scoring_system": "epss", "scoring_elements": "0.90003", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490625", "reference_id": "490625", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490625" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85340?format=api", "purl": "pkg:ebuild/net-print/cups@1.3.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.3.10" } ], "aliases": [ "CVE-2009-0166" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ctb2-8h4y-vybd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31223?format=api", "vulnerability_id": "VCID-dgb8-nes9-8fb7", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0147.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0147", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84926", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.8494", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84959", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84963", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84986", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.84993", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85008", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85006", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85024", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85023", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85048", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85056", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85054", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85071", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85095", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85116", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85112", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.85127", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02384", "scoring_system": "epss", "scoring_elements": "0.8516", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0147" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490614", "reference_id": "490614", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490614" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85340?format=api", "purl": "pkg:ebuild/net-print/cups@1.3.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.3.10" } ], "aliases": [ "CVE-2009-0147" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dgb8-nes9-8fb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31221?format=api", "vulnerability_id": "VCID-ynvq-nzrq-9bca", "summary": "Multiple vulnerabilities have been found in Poppler, some of which\n may allow execution of arbitrary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0146.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0146", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82474", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82514", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8254", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82536", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82531", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82568", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82572", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82594", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82604", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8261", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8263", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82651", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82671", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.8267", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82686", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01745", "scoring_system": "epss", "scoring_elements": "0.82727", "published_at": "2026-05-14T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0146" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612", "reference_id": "490612", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490612" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806", "reference_id": "524806", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524806" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809", "reference_id": "524809", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=524809" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" }, { "reference_url": "https://security.gentoo.org/glsa/201310-03", "reference_id": "GLSA-201310-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201310-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0429", "reference_id": "RHSA-2009:0429", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0429" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0430", "reference_id": "RHSA-2009:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0431", "reference_id": "RHSA-2009:0431", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0431" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0458", "reference_id": "RHSA-2009:0458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2009:0480", "reference_id": "RHSA-2009:0480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2009:0480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0399", "reference_id": "RHSA-2010:0399", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0399" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2010:0400", "reference_id": "RHSA-2010:0400", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2010:0400" }, { "reference_url": "https://usn.ubuntu.com/759-1/", "reference_id": "USN-759-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/759-1/" }, { "reference_url": "https://usn.ubuntu.com/973-1/", "reference_id": "USN-973-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/973-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85340?format=api", "purl": "pkg:ebuild/net-print/cups@1.3.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.3.10" } ], "aliases": [ "CVE-2009-0146" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ynvq-nzrq-9bca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60451?format=api", "vulnerability_id": "VCID-zm2g-nduw-tfcy", "summary": "Multiple errors in CUPS might allow for the remote execution of arbitrary\n code or DNS rebinding attacks.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0164.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-0164.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0164", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88816", "published_at": "2026-05-14T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88747", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88746", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88756", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88772", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88784", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88782", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88792", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88716", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88729", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88727", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88726", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04186", "scoring_system": "epss", "scoring_elements": "0.88741", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90395", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90407", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90412", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90426", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90432", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05721", "scoring_system": "epss", "scoring_elements": "0.90392", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2009-0164" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=490597", "reference_id": "490597", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490597" }, { "reference_url": "https://security.gentoo.org/glsa/200904-20", "reference_id": "GLSA-200904-20", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200904-20" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/85340?format=api", "purl": "pkg:ebuild/net-print/cups@1.3.10", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.3.10" } ], "aliases": [ "CVE-2009-0164" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zm2g-nduw-tfcy" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/net-print/cups@1.3.10" }