Lookup for vulnerable packages by Package URL.

GET /api/packages/143277?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/143277?format=api",
    "purl": "pkg:maven/org.apache.tomee/tomee@1.0.0",
    "type": "maven",
    "namespace": "org.apache.tomee",
    "name": "tomee",
    "version": "1.0.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "8.0.8",
    "latest_non_vulnerable_version": "8.0.8",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12850?format=api",
            "vulnerability_id": "VCID-5vbc-strc-5ue5",
            "summary": "Missing Authentication for Critical Function\nIf Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.0 - 1.7.5.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11969",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78088",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78172",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78177",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78178",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78144",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78148",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78166",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78141",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78135",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78109",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78127",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78097",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11969"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773@%3Cannounce.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773@%3Cannounce.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773%40%3Cdev.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c1d115b8975b7e7dc452d10e2e773%40%3Cdev.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cdev.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cdev.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cusers.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe@%3Cusers.tomee.apache.org%3E"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2020/12/16/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2020/12/16/2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11969",
                    "reference_id": "CVE-2020-11969",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-11969"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-836g-5fr5-fgcr",
                    "reference_id": "GHSA-836g-5fr5-fgcr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-836g-5fr5-fgcr"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/46058?format=api",
                    "purl": "pkg:maven/org.apache.tomee/tomee@1.7.6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/tomee@1.7.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/46057?format=api",
                    "purl": "pkg:maven/org.apache.tomee/tomee@7.0.8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-46y3-rx34-pyc6"
                        },
                        {
                            "vulnerability": "VCID-dr52-xewb-k7hv"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/tomee@7.0.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/80777?format=api",
                    "purl": "pkg:maven/org.apache.tomee/tomee@7.1.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-46y3-rx34-pyc6"
                        },
                        {
                            "vulnerability": "VCID-dr52-xewb-k7hv"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/tomee@7.1.3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/46056?format=api",
                    "purl": "pkg:maven/org.apache.tomee/tomee@8.0.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-46y3-rx34-pyc6"
                        },
                        {
                            "vulnerability": "VCID-dr52-xewb-k7hv"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/tomee@8.0.2"
                }
            ],
            "aliases": [
                "CVE-2020-11969",
                "GHSA-836g-5fr5-fgcr"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5vbc-strc-5ue5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12646?format=api",
            "vulnerability_id": "VCID-dr52-xewb-k7hv",
            "summary": "Remote code execution in Apache TomEE\nIf Apache TomEE - - - - is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management interface, however the incomplete fix does not cover this edge case.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80236",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80177",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80166",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80194",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80202",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80222",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80208",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80203",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80232",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80233",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8015",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01368",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80157",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-13931"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/ref088c4732e1a8dd0bbbb96e13ffafcfe65f984238ffa55f438d78fe%40%3Cdev.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13931",
                    "reference_id": "CVE-2020-13931",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13931"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-mp28-rq7g-qx62",
                    "reference_id": "GHSA-mp28-rq7g-qx62",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-mp28-rq7g-qx62"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/143271?format=api",
                    "purl": "pkg:maven/org.apache.tomee/tomee@7.0.0-M1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-46y3-rx34-pyc6"
                        },
                        {
                            "vulnerability": "VCID-5vbc-strc-5ue5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/tomee@7.0.0-M1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/223941?format=api",
                    "purl": "pkg:maven/org.apache.tomee/tomee@7.1.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-46y3-rx34-pyc6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/tomee@7.1.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/223944?format=api",
                    "purl": "pkg:maven/org.apache.tomee/tomee@8.0.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-46y3-rx34-pyc6"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/tomee@8.0.4"
                }
            ],
            "aliases": [
                "CVE-2020-13931",
                "GHSA-mp28-rq7g-qx62"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dr52-xewb-k7hv"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomee/tomee@1.0.0"
}