Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/42275?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/42275?format=api", "purl": "pkg:maven/org.apache.logging.log4j/log4j-core@1.2", "type": "maven", "namespace": "org.apache.logging.log4j", "name": "log4j-core", "version": "1.2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.25.3", "latest_non_vulnerable_version": "2.25.4", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11784?format=api", "vulnerability_id": "VCID-698m-2hju-2qcv", "summary": "Deserialization of Untrusted Data\nJMSAppender in Log4j is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide `TopicBindingName` and `TopicConnectionFactoryBindingName` configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j when specifically configured to use JMSAppender, which is not the default. Apache Log4j reached end of life in August Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4104.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4104.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98648", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98647", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98646", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98643", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98653", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98651", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98639", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98635", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98633", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.69284", "scoring_system": "epss", "scoring_elements": "0.98641", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4104" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/apache/logging-log4j2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/logging-log4j2" }, { "reference_url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0033" }, { "reference_url": "https://security.gentoo.org/glsa/202209-02", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "reference_url": "https://security.gentoo.org/glsa/202310-16", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202310-16" }, { "reference_url": "https://security.gentoo.org/glsa/202312-04", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202312-04" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211223-0007", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20211223-0007" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211223-0007/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20211223-0007/" }, { "reference_url": "https://www.cve.org/CVERecord?id=CVE-2021-44228", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.cve.org/CVERecord?id=CVE-2021-44228" }, { "reference_url": "https://www.kb.cert.org/vuls/id/930724", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.kb.cert.org/vuls/id/930724" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2022/01/18/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2022/01/18/3" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667", "reference_id": "2031667", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031667" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2021-4104", "reference_id": "CVE-2021-4104", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/CVE-2021-4104" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104", "reference_id": "CVE-2021-4104", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4104" }, { "reference_url": "https://github.com/advisories/GHSA-fp5r-v3w9-4333", "reference_id": "GHSA-fp5r-v3w9-4333", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-fp5r-v3w9-4333" }, { "reference_url": "https://security.gentoo.org/glsa/202312-02", "reference_id": "GLSA-202312-02", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202312-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5107", "reference_id": "RHSA-2021:5107", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5107" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5141", "reference_id": "RHSA-2021:5141", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5141" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5148", "reference_id": "RHSA-2021:5148", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5148" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5183", "reference_id": "RHSA-2021:5183", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5183" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5184", "reference_id": "RHSA-2021:5184", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5184" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5186", "reference_id": "RHSA-2021:5186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5206", "reference_id": "RHSA-2021:5206", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5206" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5269", "reference_id": "RHSA-2021:5269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0289", "reference_id": "RHSA-2022:0289", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0289" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0290", "reference_id": "RHSA-2022:0290", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0290" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0291", "reference_id": "RHSA-2022:0291", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0291" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0294", "reference_id": "RHSA-2022:0294", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0294" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0430", "reference_id": "RHSA-2022:0430", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0430" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0435", "reference_id": "RHSA-2022:0435", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0435" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0436", "reference_id": "RHSA-2022:0436", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0436" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0437", "reference_id": "RHSA-2022:0437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0438", "reference_id": "RHSA-2022:0438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0444", "reference_id": "RHSA-2022:0444", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0444" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0445", "reference_id": "RHSA-2022:0445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0446", "reference_id": "RHSA-2022:0446", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0447", "reference_id": "RHSA-2022:0447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0448", "reference_id": "RHSA-2022:0448", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0448" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0449", "reference_id": "RHSA-2022:0449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0450", "reference_id": "RHSA-2022:0450", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0450" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0475", "reference_id": "RHSA-2022:0475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0497", "reference_id": "RHSA-2022:0497", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0497" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0507", "reference_id": "RHSA-2022:0507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0524", "reference_id": "RHSA-2022:0524", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0524" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0527", "reference_id": "RHSA-2022:0527", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0527" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0553", "reference_id": "RHSA-2022:0553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0661", "reference_id": "RHSA-2022:0661", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0661" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1296", "reference_id": "RHSA-2022:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1297", "reference_id": "RHSA-2022:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1297" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1299", "reference_id": "RHSA-2022:1299", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1299" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5458", "reference_id": "RHSA-2022:5458", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5458" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5459", "reference_id": "RHSA-2022:5459", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5459" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5460", "reference_id": "RHSA-2022:5460", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5460" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5856", "reference_id": "RHSA-2024:5856", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5856" }, { "reference_url": "https://usn.ubuntu.com/5223-1/", "reference_id": "USN-5223-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5223-1/" }, { "reference_url": "https://usn.ubuntu.com/USN-5223-2/", "reference_id": "USN-USN-5223-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/USN-5223-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2021-4104", "GHSA-fp5r-v3w9-4333" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-698m-2hju-2qcv" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.logging.log4j/log4j-core@1.2" }