Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/93259?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/93259?format=api", "purl": "pkg:rpm/redhat/kernel@4.18.0-305.134.1?arch=el8_4", "type": "rpm", "namespace": "redhat", "name": "kernel", "version": "4.18.0-305.134.1", "qualifiers": { "arch": "el8_4" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/77884?format=api", "vulnerability_id": "VCID-cavt-1v84-uqgt", "summary": "kernel: GSM multiplexing race condition leads to privilege escalation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-6546.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6546", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55796", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55818", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55798", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55849", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55852", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55861", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55841", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55822", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55859", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55862", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56525", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56589", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00337", "scoring_system": "epss", "scoring_elements": "0.56543", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-6546" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6546" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255498", "reference_id": "2255498", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255498" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0930", "reference_id": "RHSA-2024:0930", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0930" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0937", "reference_id": "RHSA-2024:0937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0937" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1018", "reference_id": "RHSA-2024:1018", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1018" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1019", "reference_id": "RHSA-2024:1019", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1019" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1055", "reference_id": "RHSA-2024:1055", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1055" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1250", "reference_id": "RHSA-2024:1250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1253", "reference_id": "RHSA-2024:1253", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1253" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1306", "reference_id": "RHSA-2024:1306", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1306" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1607", "reference_id": "RHSA-2024:1607", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1607" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1612", "reference_id": "RHSA-2024:1612", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1612" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1614", "reference_id": "RHSA-2024:1614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2093", "reference_id": "RHSA-2024:2093", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2093" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2394", "reference_id": "RHSA-2024:2394", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2394" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2621", "reference_id": "RHSA-2024:2621", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2621" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2697", "reference_id": "RHSA-2024:2697", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2697" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4577", "reference_id": "RHSA-2024:4577", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4577" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4729", "reference_id": "RHSA-2024:4729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4731", "reference_id": "RHSA-2024:4731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4970", "reference_id": "RHSA-2024:4970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4970" } ], "fixed_packages": [], "aliases": [ "CVE-2023-6546" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cavt-1v84-uqgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76357?format=api", "vulnerability_id": "VCID-z5cz-xkzn-fbb6", "summary": "kernel: dmaengine/idxd: hardware erratum allows potential security problem with direct access by untrusted application", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21823.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-21823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17928", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1818", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18187", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.1809", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18033", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18045", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18079", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17988", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.17965", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18287", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18338", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18041", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00058", "scoring_system": "epss", "scoring_elements": "0.18124", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-21823" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21823" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/05/15/1", "reference_id": "1", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-23T18:02:56Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2024/05/15/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278989", "reference_id": "2278989", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2278989" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/", "reference_id": "DW2MIOIMOFUSNLHLRYX23AFR36BMKD65", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-23T18:02:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DW2MIOIMOFUSNLHLRYX23AFR36BMKD65/" }, { "reference_url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html", "reference_id": "intel-sa-01084.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-23T18:02:56Z/" } ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01084.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/", "reference_id": "OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-23T18:02:56Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4729", "reference_id": "RHSA-2024:4729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4729" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:4731", "reference_id": "RHSA-2024:4731", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:4731" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5101", "reference_id": "RHSA-2024:5101", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5101" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5102", "reference_id": "RHSA-2024:5102", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5102" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5256", "reference_id": "RHSA-2024:5256", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5256" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5257", "reference_id": "RHSA-2024:5257", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5257" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5281", "reference_id": "RHSA-2024:5281", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5281" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5363", "reference_id": "RHSA-2024:5363", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5363" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5364", "reference_id": "RHSA-2024:5364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5365", "reference_id": "RHSA-2024:5365", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5365" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6206", "reference_id": "RHSA-2024:6206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6206" }, { "reference_url": "https://usn.ubuntu.com/6816-1/", "reference_id": "USN-6816-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6816-1/" }, { "reference_url": "https://usn.ubuntu.com/6818-1/", "reference_id": "USN-6818-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-1/" }, { "reference_url": "https://usn.ubuntu.com/6818-2/", "reference_id": "USN-6818-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-2/" }, { "reference_url": "https://usn.ubuntu.com/6818-3/", "reference_id": "USN-6818-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-3/" }, { "reference_url": "https://usn.ubuntu.com/6818-4/", "reference_id": "USN-6818-4", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6818-4/" }, { "reference_url": "https://usn.ubuntu.com/6820-1/", "reference_id": "USN-6820-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6820-1/" }, { "reference_url": "https://usn.ubuntu.com/6820-2/", "reference_id": "USN-6820-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6820-2/" }, { "reference_url": "https://usn.ubuntu.com/6864-1/", "reference_id": "USN-6864-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6864-1/" }, { "reference_url": "https://usn.ubuntu.com/6864-2/", "reference_id": "USN-6864-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6864-2/" }, { "reference_url": "https://usn.ubuntu.com/6864-3/", "reference_id": "USN-6864-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6864-3/" }, { "reference_url": "https://usn.ubuntu.com/6870-1/", "reference_id": "USN-6870-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6870-1/" }, { "reference_url": "https://usn.ubuntu.com/6870-2/", "reference_id": "USN-6870-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6870-2/" }, { "reference_url": "https://usn.ubuntu.com/6871-1/", "reference_id": "USN-6871-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6871-1/" }, { "reference_url": "https://usn.ubuntu.com/6873-1/", "reference_id": "USN-6873-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6873-1/" }, { "reference_url": "https://usn.ubuntu.com/6873-2/", "reference_id": "USN-6873-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6873-2/" }, { "reference_url": "https://usn.ubuntu.com/6874-1/", "reference_id": "USN-6874-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6874-1/" }, { "reference_url": "https://usn.ubuntu.com/6875-1/", "reference_id": "USN-6875-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6875-1/" }, { "reference_url": "https://usn.ubuntu.com/6878-1/", "reference_id": "USN-6878-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6878-1/" }, { "reference_url": "https://usn.ubuntu.com/6892-1/", "reference_id": "USN-6892-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6892-1/" }, { "reference_url": "https://usn.ubuntu.com/6919-1/", "reference_id": "USN-6919-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6919-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-21823" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z5cz-xkzn-fbb6" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel@4.18.0-305.134.1%3Farch=el8_4" }