Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/41691?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/41691?format=api",
    "vulnerability_id": "VCID-h58p-g575-bkg6",
    "summary": "Multiple vulnerabilities have been found in PostgreSQL, the worst\n    of which could result in execution of arbitrary code or privilege\n    escalation.",
    "aliases": [
        {
            "alias": "CVE-2016-0766"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/571026?format=api",
            "purl": "pkg:deb/debian/postgresql-9.1@9.1.21-0%2Bdeb7u1",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.1@9.1.21-0%252Bdeb7u1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1035557?format=api",
            "purl": "pkg:deb/debian/postgresql-9.4@9.4.7-0%2Bdeb8u1~bpo70%2B2",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-3qrq-rc38-13ep"
                },
                {
                    "vulnerability": "VCID-45vk-2xsq-cffk"
                },
                {
                    "vulnerability": "VCID-723y-bsbd-6kfd"
                },
                {
                    "vulnerability": "VCID-8bu8-zpfv-8bgg"
                },
                {
                    "vulnerability": "VCID-9b6v-1bt1-dfgy"
                },
                {
                    "vulnerability": "VCID-csfh-831q-rqfv"
                },
                {
                    "vulnerability": "VCID-d362-bmcf-3kdz"
                },
                {
                    "vulnerability": "VCID-qn5k-y64c-7ffc"
                },
                {
                    "vulnerability": "VCID-um7d-pzhb-n3c9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.7-0%252Bdeb8u1~bpo70%252B2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/75754?format=api",
            "purl": "pkg:ebuild/dev-db/postgresql@9.1.23",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.1.23"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/75755?format=api",
            "purl": "pkg:ebuild/dev-db/postgresql@9.2.18",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.2.18"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/75756?format=api",
            "purl": "pkg:ebuild/dev-db/postgresql@9.3.14",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.3.14"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/75757?format=api",
            "purl": "pkg:ebuild/dev-db/postgresql@9.4.9",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.4.9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/75758?format=api",
            "purl": "pkg:ebuild/dev-db/postgresql@9.5.4",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-db/postgresql@9.5.4"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/571025?format=api",
            "purl": "pkg:deb/debian/postgresql-9.1@9.1.15-0%2Bdeb8u1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1qap-rdxz-4uer"
                },
                {
                    "vulnerability": "VCID-29zx-dp37-s3g9"
                },
                {
                    "vulnerability": "VCID-625c-amyd-dybm"
                },
                {
                    "vulnerability": "VCID-fd5z-bj21-m3a5"
                },
                {
                    "vulnerability": "VCID-h58p-g575-bkg6"
                },
                {
                    "vulnerability": "VCID-mebz-9qb7-5bd2"
                },
                {
                    "vulnerability": "VCID-t864-ytjh-nyg1"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.1@9.1.15-0%252Bdeb8u1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1035556?format=api",
            "purl": "pkg:deb/debian/postgresql-9.4@9.4.1-1",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-1qap-rdxz-4uer"
                },
                {
                    "vulnerability": "VCID-3qrq-rc38-13ep"
                },
                {
                    "vulnerability": "VCID-45vk-2xsq-cffk"
                },
                {
                    "vulnerability": "VCID-625c-amyd-dybm"
                },
                {
                    "vulnerability": "VCID-723y-bsbd-6kfd"
                },
                {
                    "vulnerability": "VCID-8bu8-zpfv-8bgg"
                },
                {
                    "vulnerability": "VCID-9b6v-1bt1-dfgy"
                },
                {
                    "vulnerability": "VCID-csfh-831q-rqfv"
                },
                {
                    "vulnerability": "VCID-d362-bmcf-3kdz"
                },
                {
                    "vulnerability": "VCID-esps-vak5-bqcp"
                },
                {
                    "vulnerability": "VCID-fd5z-bj21-m3a5"
                },
                {
                    "vulnerability": "VCID-h58p-g575-bkg6"
                },
                {
                    "vulnerability": "VCID-mebz-9qb7-5bd2"
                },
                {
                    "vulnerability": "VCID-qn5k-y64c-7ffc"
                },
                {
                    "vulnerability": "VCID-t864-ytjh-nyg1"
                },
                {
                    "vulnerability": "VCID-um7d-pzhb-n3c9"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/postgresql-9.4@9.4.1-1"
        }
    ],
    "references": [
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00049.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00052.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00054.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00056.html"
        },
        {
            "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00016.html"
        },
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0766",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.5895",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.59004",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.5899",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.58884",
                    "published_at": "2026-04-01T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.58959",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.58981",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.58947",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.58999",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.59006",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.59025",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.58988",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.59022",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00372",
                    "scoring_system": "epss",
                    "scoring_elements": "0.59026",
                    "published_at": "2026-04-18T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-0766"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5288"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0766"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773"
        },
        {
            "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.8",
                    "scoring_system": "cvssv2",
                    "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                }
            ],
            "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
        },
        {
            "reference_url": "http://www.debian.org/security/2016/dsa-3475",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.debian.org/security/2016/dsa-3475"
        },
        {
            "reference_url": "http://www.debian.org/security/2016/dsa-3476",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.debian.org/security/2016/dsa-3476"
        },
        {
            "reference_url": "http://www.postgresql.org/about/news/1644/",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.postgresql.org/about/news/1644/"
        },
        {
            "reference_url": "http://www.postgresql.org/docs/current/static/release-9-1-20.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.postgresql.org/docs/current/static/release-9-1-20.html"
        },
        {
            "reference_url": "http://www.postgresql.org/docs/current/static/release-9-2-15.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.postgresql.org/docs/current/static/release-9-2-15.html"
        },
        {
            "reference_url": "http://www.postgresql.org/docs/current/static/release-9-3-11.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.postgresql.org/docs/current/static/release-9-3-11.html"
        },
        {
            "reference_url": "http://www.postgresql.org/docs/current/static/release-9-4-6.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.postgresql.org/docs/current/static/release-9-4-6.html"
        },
        {
            "reference_url": "http://www.postgresql.org/docs/current/static/release-9-5-1.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.postgresql.org/docs/current/static/release-9-5-1.html"
        },
        {
            "reference_url": "http://www.securityfocus.com/bid/83184",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.securityfocus.com/bid/83184"
        },
        {
            "reference_url": "http://www.securitytracker.com/id/1035005",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.securitytracker.com/id/1035005"
        },
        {
            "reference_url": "http://www.ubuntu.com/usn/USN-2894-1",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "http://www.ubuntu.com/usn/USN-2894-1"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
            "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
            "reference_type": "",
            "scores": [],
            "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0766",
            "reference_id": "CVE-2016-0766",
            "reference_type": "",
            "scores": [
                {
                    "value": "9.0",
                    "scoring_system": "cvssv2",
                    "scoring_elements": "AV:N/AC:L/Au:S/C:C/I:C/A:C"
                },
                {
                    "value": "8.8",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0766"
        },
        {
            "reference_url": "https://security.gentoo.org/glsa/201701-33",
            "reference_id": "GLSA-201701-33",
            "reference_type": "",
            "scores": [],
            "url": "https://security.gentoo.org/glsa/201701-33"
        },
        {
            "reference_url": "https://usn.ubuntu.com/2894-1/",
            "reference_id": "USN-2894-1",
            "reference_type": "",
            "scores": [],
            "url": "https://usn.ubuntu.com/2894-1/"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 264,
            "name": "Permissions, Privileges, and Access Controls",
            "description": "Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control."
        }
    ],
    "exploits": [],
    "severity_range_score": "6.8 - 9.0",
    "exploitability": "0.5",
    "weighted_severity": "8.1",
    "risk_score": 4.0,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h58p-g575-bkg6"
}