Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/160748?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/160748?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.17.4", "type": "maven", "namespace": "org.apache.camel", "name": "camel-core", "version": "2.17.4", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.24.0", "latest_non_vulnerable_version": "4.4.0", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10615?format=api", "vulnerability_id": "VCID-579q-qqj8-63gs", "summary": "Path Traversal\nApache Camel's File is vulnerable to directory traversal.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0194.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0194.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-0194", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.85068", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.8507", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.85062", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.85037", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.8504", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.85038", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.85017", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.8502", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.84955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.84941", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.85022", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.85006", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.84999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.84976", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02389", "scoring_system": "epss", "scoring_elements": "0.84972", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-0194" }, { "reference_url": "https://github.com/apache/camel", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/camel" }, { "reference_url": "https://github.com/apache/camel/pull/2700", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/camel/pull/2700" }, { "reference_url": "https://issues.apache.org/jira/browse/CAMEL-13042", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/CAMEL-13042" }, { "reference_url": "https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/0a163d02169d3d361150e8183df4af33f1a3d8a419b2937ac8e6c66f@%3Cusers.camel.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/45e23ade8d3cb754615f95975e89e8dc73c59eeac914f07d53acbac6@%3Ccommits.camel.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/a39441db574ee996f829344491b3211b53c9ed926f00ae5d88943b76@%3Cdev.camel.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/30/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2019/04/30/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707581", "reference_id": "1707581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1707581" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0194", "reference_id": "CVE-2019-0194", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0194" }, { "reference_url": "https://github.com/advisories/GHSA-4wjq-69rc-8wcp", "reference_id": "GHSA-4wjq-69rc-8wcp", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-4wjq-69rc-8wcp" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/36388?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.19.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.19.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/36389?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.21.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.21.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/79266?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.21.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.21.5" }, { "url": "http://public2.vulnerablecode.io/api/packages/36390?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.22.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.22.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/36391?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.23.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.23.1" } ], "aliases": [ "CVE-2019-0194", "GHSA-4wjq-69rc-8wcp" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-579q-qqj8-63gs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4577?format=api", "vulnerability_id": "VCID-et64-wksj-qyhj", "summary": "Apache Camel's Validation Component is vulnerable against SSRF via remote DTDs and XXE.", "references": [ { "reference_url": "http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://camel.apache.org/security-advisories.data/CVE-2017-5643.txt.asc?version=1&modificationDate=1489652454000&api=v2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:1832", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2017:1832" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5643.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5643.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80489", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80354", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.8036", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.8038", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80369", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80398", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80408", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80427", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80411", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80434", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80436", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80439", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80466", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01398", "scoring_system": "epss", "scoring_elements": "0.80472", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5643" }, { "reference_url": "https://github.com/advisories/GHSA-vq9j-jh62-5hmp", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-vq9j-jh62-5hmp" }, { "reference_url": "https://github.com/apache/camel", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/camel" }, { "reference_url": "https://github.com/apache/camel/commit/2c6964ae94d8f9a9c9a32e5ae5a0b794e8b8d3b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/camel/commit/2c6964ae94d8f9a9c9a32e5ae5a0b794e8b8d3b" }, { "reference_url": "https://github.com/apache/camel/commit/2c6964ae94d8f9a9c9a32e5ae5a0b794e8b8d3be", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/camel/commit/2c6964ae94d8f9a9c9a32e5ae5a0b794e8b8d3be" }, { "reference_url": "https://github.com/apache/camel/commit/87c92b7b38890c217bc76f2c55036e6a5cca9a0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/camel/commit/87c92b7b38890c217bc76f2c55036e6a5cca9a0" }, { "reference_url": "https://github.com/apache/camel/commit/8afc5d1757795fde715902067360af5d90f046d", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/camel/commit/8afc5d1757795fde715902067360af5d90f046d" }, { "reference_url": "https://github.com/apache/camel/commit/8afc5d1757795fde715902067360af5d90f046da", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/camel/commit/8afc5d1757795fde715902067360af5d90f046da" }, { "reference_url": "https://github.com/apache/camel/commit/9f7376abbff7434794f2c7c2909e02bac232fb5", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/camel/commit/9f7376abbff7434794f2c7c2909e02bac232fb5" }, { "reference_url": "https://github.com/apache/camel/commit/9f7376abbff7434794f2c7c2909e02bac232fb5b", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/camel/commit/9f7376abbff7434794f2c7c2909e02bac232fb5b" }, { "reference_url": "https://github.com/apache/camel/commit/ec3d0db81ba061b27e934d5ff56e9baca0049eb", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/camel/commit/ec3d0db81ba061b27e934d5ff56e9baca0049eb" }, { "reference_url": "https://issues.apache.org/jira/browse/CAMEL-10894", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/CAMEL-10894" }, { "reference_url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf%40%3Ccommits.camel.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d%40%3Ccommits.camel.apache.org%3E" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5643", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5643" }, { "reference_url": "http://www.securityfocus.com/bid/97226", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/97226" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433374", "reference_id": "1433374", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1433374" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.17.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.17.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:camel:2.18.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:camel:2.18.2:*:*:*:*:*:*:*" }, { "reference_url": "https://www.cvedetails.com/cve/CVE-2017-5643/", "reference_id": "CVE-2017-5643", "reference_type": "", "scores": [], "url": "https://www.cvedetails.com/cve/CVE-2017-5643/" }, { "reference_url": "https://camel.apache.org/security-advisories.data/CVE-2017-5643.txt", "reference_id": "CVE-2017-5643.TXT", "reference_type": "", "scores": [], "url": "https://camel.apache.org/security-advisories.data/CVE-2017-5643.txt" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/23962?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.17.6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-579q-qqj8-63gs" }, { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.17.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/23961?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.18.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-579q-qqj8-63gs" }, { "vulnerability": "VCID-et64-wksj-qyhj" }, { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.18.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/23963?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.18.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-579q-qqj8-63gs" }, { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.18.3" }, { "url": "http://public2.vulnerablecode.io/api/packages/23964?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.19.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-579q-qqj8-63gs" }, { "vulnerability": "VCID-n8rf-enh6-q3bq" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.19.0" } ], "aliases": [ "CVE-2017-5643", "GHSA-vq9j-jh62-5hmp" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-et64-wksj-qyhj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10683?format=api", "vulnerability_id": "VCID-n8rf-enh6-q3bq", "summary": "Apache Camel contains an XML external entity injection vulnerability due to using an outdated vulnerable JSON-lib library. This affects only the `camel-xmljson` component, which was removed.", "references": [ { "reference_url": "http://jvn.jp/en/jp/JVN71498764/index.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://jvn.jp/en/jp/JVN71498764/index.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0188.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-0188.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-0188", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00961", "scoring_system": "epss", "scoring_elements": "0.76575", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79915", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79886", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79894", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79838", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79867", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79855", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79883", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79911", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.7989", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79954", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79947", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01323", "scoring_system": "epss", "scoring_elements": "0.79919", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-0188" }, { "reference_url": "https://github.com/apache/camel/releases/tag/camel-2.24.0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/camel/releases/tag/camel-2.24.0" }, { "reference_url": "https://issues.apache.org/jira/browse/TAMAYA-410", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/TAMAYA-410" }, { "reference_url": "https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/00118387610522b107cbdcec5369ddd512b576ff0236a02bfca12f44@%3Cusers.camel.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/45349f8bd98c1c13a84beddede18fe79b8619ebab99d90f1fb43d7ab@%3Cdev.tamaya.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/61601cda2c5f9832184ea14647b0c0589c94126a460c8eb196be1313@%3Ccommits.tamaya.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/63d1cec8541befeb59dbed23a6b227bdcca7674aa234fb43354dac82@%3Ccommits.tamaya.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/6fefbd90f7fb4c8412d85ea3e9e97a4b76b47e206f502c73c29dc0b7@%3Ccommits.tamaya.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/84ba9b79e801a4148dde73d1969cdae0247d11ff63de7ce11b394dc5@%3Ccommits.tamaya.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/ac51944aef91dd5006b8510b0bef337adaccfe962fb90e7af9c22db4@%3Cissues.activemq.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/eed73fc18d4fa3e2341cd0ab101b47f06b16c7efc1cb73791c524c9d@%3Cdev.tamaya.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/fe74d173689600d9a395d026f0bf5d154c0bf7bd195ecfbc2c987036@%3Cdev.tamaya.apache.org%3E" }, { "reference_url": "https://www.openwall.com/lists/oss-security/2019/05/24/1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openwall.com/lists/oss-security/2019/05/24/1" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://www.securityfocus.com/bid/108422/info", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.securityfocus.com/bid/108422/info" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2019/05/24/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2019/05/24/2" }, { "reference_url": "http://www.securityfocus.com/bid/108422", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/108422" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719519", "reference_id": "1719519", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1719519" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0188", "reference_id": "CVE-2019-0188", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-0188" }, { "reference_url": "https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc", "reference_id": "CVE-2019-0188.TXT.ASC", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/camel/blob/master/docs/user-manual/en/security-advisories/CVE-2019-0188.txt.asc" }, { "reference_url": "https://github.com/advisories/GHSA-h896-mx9x-g32g", "reference_id": "GHSA-h896-mx9x-g32g", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-h896-mx9x-g32g" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/36881?format=api", "purl": "pkg:maven/org.apache.camel/camel-core@2.24.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.24.0" } ], "aliases": [ "CVE-2019-0188", "GHSA-h896-mx9x-g32g" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n8rf-enh6-q3bq" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.camel/camel-core@2.17.4" }