Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/88530?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/88530?format=api", "purl": "pkg:rpm/redhat/kernel-rt@4.18.0-553.89.1.rt7.430?arch=el8_10", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "4.18.0-553.89.1.rt7.430", "qualifiers": { "arch": "el8_10" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67527?format=api", "vulnerability_id": "VCID-1c4a-w8jv-cudd", "summary": "kernel: mm: kmem: fix a NULL pointer dereference in obj_stock_flush_required()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53401.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53401.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53401", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01826", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01857", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01838", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0184", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01843", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01844", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01829", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01824", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02281", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02261", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02252", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02295", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02262", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02266", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02186", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00013", "scoring_system": "epss", "scoring_elements": "0.02197", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53401" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53401", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53401" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396417", "reference_id": "2396417", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396417" }, { "reference_url": "https://git.kernel.org/stable/c/33391c7e1a2ad612bf3922cc168cb09a46bbe236", "reference_id": "33391c7e1a2ad612bf3922cc168cb09a46bbe236", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:39Z/" } ], "url": "https://git.kernel.org/stable/c/33391c7e1a2ad612bf3922cc168cb09a46bbe236" }, { "reference_url": "https://git.kernel.org/stable/c/33d9490b27e5d8da4444aefd714a4f50189db978", "reference_id": "33d9490b27e5d8da4444aefd714a4f50189db978", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:39Z/" } ], "url": "https://git.kernel.org/stable/c/33d9490b27e5d8da4444aefd714a4f50189db978" }, { "reference_url": "https://git.kernel.org/stable/c/3b8abb3239530c423c0b97e42af7f7e856e1ee96", "reference_id": "3b8abb3239530c423c0b97e42af7f7e856e1ee96", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-14T19:01:39Z/" } ], "url": "https://git.kernel.org/stable/c/3b8abb3239530c423c0b97e42af7f7e856e1ee96" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9315", "reference_id": "RHSA-2024:9315", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9315" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19886", "reference_id": "RHSA-2025:19886", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19886" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21051", "reference_id": "RHSA-2025:21051", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21051" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21091", "reference_id": "RHSA-2025:21091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21128", "reference_id": "RHSA-2025:21128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21136", "reference_id": "RHSA-2025:21136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22800", "reference_id": "RHSA-2025:22800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22801", "reference_id": "RHSA-2025:22801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23427", "reference_id": "RHSA-2025:23427", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23427" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0533", "reference_id": "RHSA-2026:0533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0536", "reference_id": "RHSA-2026:0536", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0536" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53401" ], "risk_score": 3.3, "exploitability": "0.5", "weighted_severity": "6.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1c4a-w8jv-cudd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67148?format=api", "vulnerability_id": "VCID-676c-3wrp-1ufr", "summary": "kernel: RDMA/rxe: Fix incomplete state save in rxe_requester", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53539.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-53539.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53539", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03198", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03205", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03231", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03185", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03158", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03142", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03123", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03242", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03243", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03238", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00015", "scoring_system": "epss", "scoring_elements": "0.03116", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00016", "scoring_system": "epss", "scoring_elements": "0.0361", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04438", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00017", "scoring_system": "epss", "scoring_elements": "0.04465", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-53539" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-53539" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401510", "reference_id": "2401510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401510" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22800", "reference_id": "RHSA-2025:22800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22801", "reference_id": "RHSA-2025:22801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0534", "reference_id": "RHSA-2026:0534", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0535", "reference_id": "RHSA-2026:0535", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:10756", "reference_id": "RHSA-2026:10756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:10756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1445", "reference_id": "RHSA-2026:1445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1494", "reference_id": "RHSA-2026:1494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1495", "reference_id": "RHSA-2026:1495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2664", "reference_id": "RHSA-2026:2664", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2664" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3360", "reference_id": "RHSA-2026:3360", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3360" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5691", "reference_id": "RHSA-2026:5691", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5691" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9870", "reference_id": "RHSA-2026:9870", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9870" } ], "fixed_packages": [], "aliases": [ "CVE-2023-53539" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-676c-3wrp-1ufr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66972?format=api", "vulnerability_id": "VCID-fnzb-ch6y-t7ev", "summary": "kernel: RDMA/rxe: Fix mr->map double free", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-50543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01854", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01868", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01871", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01884", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0187", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01849", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01908", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01904", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01937", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.0183", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01829", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00012", "scoring_system": "epss", "scoring_elements": "0.01914", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02616", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02633", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-50543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402222", "reference_id": "2402222", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402222" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2951", "reference_id": "RHSA-2023:2951", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2951" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6583", "reference_id": "RHSA-2023:6583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22800", "reference_id": "RHSA-2025:22800", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22800" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22801", "reference_id": "RHSA-2025:22801", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22801" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0532", "reference_id": "RHSA-2026:0532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0536", "reference_id": "RHSA-2026:0536", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0536" } ], "fixed_packages": [], "aliases": [ "CVE-2022-50543" ], "risk_score": 3.5, "exploitability": "0.5", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fnzb-ch6y-t7ev" } ], "fixing_vulnerabilities": [], "risk_score": "3.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@4.18.0-553.89.1.rt7.430%3Farch=el8_10" }