Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/93556?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/93556?format=api", "purl": "pkg:rpm/redhat/kernel-rt@5.14.0-284.64.1.rt14.349?arch=el9_2", "type": "rpm", "namespace": "redhat", "name": "kernel-rt", "version": "5.14.0-284.64.1.rt14.349", "qualifiers": { "arch": "el9_2" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76940?format=api", "vulnerability_id": "VCID-ba6k-mvxj-8udm", "summary": "hw: amd: Instruction raise #VC exception at exit", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25742.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25742.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25742", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13658", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13779", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13731", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13641", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13638", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1371", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13721", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.1369", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13597", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13503", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13855", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13912", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13713", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13795", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13846", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.13815", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25742" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25742" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270836", "reference_id": "2270836", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270836" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html", "reference_id": "amd-sb-3008.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html" }, { "reference_url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9", "reference_id": "ChangeLog-6.9", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/" } ], "url": "https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9" }, { "reference_url": "https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f", "reference_id": "e3ef461af35a8c74f2f4ce6616491ddb355a208f", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/" } ], "url": "https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f" }, { "reference_url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f", "reference_id": "?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-20T14:09:31Z/" } ], "url": "https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2627", "reference_id": "RHSA-2024:2627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2628", "reference_id": "RHSA-2024:2628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2758", "reference_id": "RHSA-2024:2758", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2950", "reference_id": "RHSA-2024:2950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3421", "reference_id": "RHSA-2024:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3810", "reference_id": "RHSA-2024:3810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3810" }, { "reference_url": "https://usn.ubuntu.com/6921-1/", "reference_id": "USN-6921-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6921-1/" }, { "reference_url": "https://usn.ubuntu.com/6921-2/", "reference_id": "USN-6921-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6921-2/" }, { "reference_url": "https://usn.ubuntu.com/6923-1/", "reference_id": "USN-6923-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6923-1/" }, { "reference_url": "https://usn.ubuntu.com/6923-2/", "reference_id": "USN-6923-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6923-2/" }, { "reference_url": "https://usn.ubuntu.com/6927-1/", "reference_id": "USN-6927-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6927-1/" }, { "reference_url": "https://usn.ubuntu.com/6952-1/", "reference_id": "USN-6952-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6952-1/" }, { "reference_url": "https://usn.ubuntu.com/6952-2/", "reference_id": "USN-6952-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6952-2/" }, { "reference_url": "https://usn.ubuntu.com/6956-1/", "reference_id": "USN-6956-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6956-1/" }, { "reference_url": "https://usn.ubuntu.com/6957-1/", "reference_id": "USN-6957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6957-1/" }, { "reference_url": "https://usn.ubuntu.com/7019-1/", "reference_id": "USN-7019-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7019-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2024-25742" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ba6k-mvxj-8udm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76941?format=api", "vulnerability_id": "VCID-hucp-gu2u-97e1", "summary": "hw: amd: Instruction raise #VC exception at exit", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25743.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-25743.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25743", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31605", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32106", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32084", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32056", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31891", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31764", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31682", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.31533", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32235", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.3206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32111", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32138", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32142", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32104", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32073", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-25743" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25743" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270836", "reference_id": "2270836", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270836" }, { "reference_url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html", "reference_id": "amd-sb-3008.html", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/" } ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2627", "reference_id": "RHSA-2024:2627", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2628", "reference_id": "RHSA-2024:2628", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2758", "reference_id": "RHSA-2024:2758", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2758" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2950", "reference_id": "RHSA-2024:2950", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2950" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3138", "reference_id": "RHSA-2024:3138", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3138" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3421", "reference_id": "RHSA-2024:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:3810", "reference_id": "RHSA-2024:3810", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:3810" }, { "reference_url": "https://bugzilla.suse.com/show_bug.cgi?id=1223307", "reference_id": "show_bug.cgi?id=1223307", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-07-23T19:06:44Z/" } ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=1223307" } ], "fixed_packages": [], "aliases": [ "CVE-2024-25743" ], "risk_score": 3.2, "exploitability": "0.5", "weighted_severity": "6.4", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hucp-gu2u-97e1" } ], "fixing_vulnerabilities": [], "risk_score": "3.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/kernel-rt@5.14.0-284.64.1.rt14.349%3Farch=el9_2" }