Lookup for vulnerable packages by Package URL.

Purlpkg:composer/guzzlehttp/guzzle@6.5.8
Typecomposer
Namespaceguzzlehttp
Nameguzzle
Version6.5.8
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version7.0.0-beta.1
Latest_non_vulnerable_version7.4.5
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9xyz-wzr8-wqhz
vulnerability_id VCID-9xyz-wzr8-wqhz
summary Multiple vulnerabilities have been found in MediaWiki, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31090
reference_id
reference_type
scores
0
value 0.03005
scoring_system epss
scoring_elements 0.86529
published_at 2026-04-02T12:55:00Z
1
value 0.03005
scoring_system epss
scoring_elements 0.86609
published_at 2026-04-24T12:55:00Z
2
value 0.03005
scoring_system epss
scoring_elements 0.86599
published_at 2026-04-18T12:55:00Z
3
value 0.03005
scoring_system epss
scoring_elements 0.86594
published_at 2026-04-16T12:55:00Z
4
value 0.03005
scoring_system epss
scoring_elements 0.86576
published_at 2026-04-09T12:55:00Z
5
value 0.03005
scoring_system epss
scoring_elements 0.86567
published_at 2026-04-08T12:55:00Z
6
value 0.03005
scoring_system epss
scoring_elements 0.86547
published_at 2026-04-07T12:55:00Z
7
value 0.03005
scoring_system epss
scoring_elements 0.86548
published_at 2026-04-04T12:55:00Z
8
value 0.03005
scoring_system epss
scoring_elements 0.8658
published_at 2026-04-13T12:55:00Z
9
value 0.03005
scoring_system epss
scoring_elements 0.86587
published_at 2026-04-12T12:55:00Z
10
value 0.03005
scoring_system epss
scoring_elements 0.86591
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31090
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44854
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44855
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28201
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28202
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28203
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29248
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31042
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31043
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31090
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34911
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34912
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41765
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41767
16
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31090.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31090.yaml
17
reference_url https://github.com/guzzle/guzzle
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/guzzle/guzzle
18
reference_url https://github.com/guzzle/guzzle/blob/6.5.8/CHANGELOG.md
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/guzzle/guzzle/blob/6.5.8/CHANGELOG.md
19
reference_url https://github.com/guzzle/guzzle/blob/7.4.5/CHANGELOG.md
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/guzzle/guzzle/blob/7.4.5/CHANGELOG.md
20
reference_url https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:04:50Z/
url https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82
21
reference_url https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:04:50Z/
url https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r
22
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31090
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31090
23
reference_url https://www.debian.org/security/2022/dsa-5246
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:04:50Z/
url https://www.debian.org/security/2022/dsa-5246
24
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014492
reference_id 1014492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014492
25
reference_url https://security.archlinux.org/AVG-2823
reference_id AVG-2823
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2823
26
reference_url https://github.com/advisories/GHSA-25mq-v84q-4j7r
reference_id GHSA-25mq-v84q-4j7r
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-25mq-v84q-4j7r
27
reference_url https://security.gentoo.org/glsa/202305-24
reference_id GLSA-202305-24
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:04:50Z/
url https://security.gentoo.org/glsa/202305-24
fixed_packages
0
url pkg:composer/guzzlehttp/guzzle@6.5.8
purl pkg:composer/guzzlehttp/guzzle@6.5.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/guzzlehttp/guzzle@6.5.8
1
url pkg:composer/guzzlehttp/guzzle@7.4.5
purl pkg:composer/guzzlehttp/guzzle@7.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/guzzlehttp/guzzle@7.4.5
aliases CVE-2022-31090, GHSA-25mq-v84q-4j7r, GMS-2022-2528
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9xyz-wzr8-wqhz
1
url VCID-wzqf-k99e-vbeu
vulnerability_id VCID-wzqf-k99e-vbeu
summary Multiple vulnerabilities have been found in MediaWiki, the worst of which could result in denial of service.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-31091
reference_id
reference_type
scores
0
value 0.0034
scoring_system epss
scoring_elements 0.5672
published_at 2026-04-02T12:55:00Z
1
value 0.0034
scoring_system epss
scoring_elements 0.5668
published_at 2026-04-24T12:55:00Z
2
value 0.0034
scoring_system epss
scoring_elements 0.56742
published_at 2026-04-21T12:55:00Z
3
value 0.0034
scoring_system epss
scoring_elements 0.56768
published_at 2026-04-18T12:55:00Z
4
value 0.0034
scoring_system epss
scoring_elements 0.5674
published_at 2026-04-13T12:55:00Z
5
value 0.0034
scoring_system epss
scoring_elements 0.56761
published_at 2026-04-12T12:55:00Z
6
value 0.0034
scoring_system epss
scoring_elements 0.56784
published_at 2026-04-11T12:55:00Z
7
value 0.0034
scoring_system epss
scoring_elements 0.56775
published_at 2026-04-09T12:55:00Z
8
value 0.0034
scoring_system epss
scoring_elements 0.56771
published_at 2026-04-16T12:55:00Z
9
value 0.0034
scoring_system epss
scoring_elements 0.56719
published_at 2026-04-07T12:55:00Z
10
value 0.0034
scoring_system epss
scoring_elements 0.56741
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-31091
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44854
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44855
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28201
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28202
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28202
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28203
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28203
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29248
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29248
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31042
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31042
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31043
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31043
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31090
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31090
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31091
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34911
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34912
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34912
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41765
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41767
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41767
16
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31091.yaml
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/guzzlehttp/guzzle/CVE-2022-31091.yaml
17
reference_url https://github.com/guzzle/guzzle
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/guzzle/guzzle
18
reference_url https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:04:47Z/
url https://github.com/guzzle/guzzle/commit/1dd98b0564cb3f6bd16ce683cb755f94c10fbd82
19
reference_url https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:04:47Z/
url https://github.com/guzzle/guzzle/security/advisories/GHSA-q559-8m2m-g699
20
reference_url https://nvd.nist.gov/vuln/detail/CVE-2022-31091
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2022-31091
21
reference_url https://www.debian.org/security/2022/dsa-5246
reference_id
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:04:47Z/
url https://www.debian.org/security/2022/dsa-5246
22
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014492
reference_id 1014492
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014492
23
reference_url https://security.archlinux.org/AVG-2823
reference_id AVG-2823
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2823
24
reference_url https://github.com/advisories/GHSA-q559-8m2m-g699
reference_id GHSA-q559-8m2m-g699
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-q559-8m2m-g699
25
reference_url https://security.gentoo.org/glsa/202305-24
reference_id GLSA-202305-24
reference_type
scores
0
value 7.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-23T14:04:47Z/
url https://security.gentoo.org/glsa/202305-24
fixed_packages
0
url pkg:composer/guzzlehttp/guzzle@6.5.8
purl pkg:composer/guzzlehttp/guzzle@6.5.8
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/guzzlehttp/guzzle@6.5.8
1
url pkg:composer/guzzlehttp/guzzle@7.4.5
purl pkg:composer/guzzlehttp/guzzle@7.4.5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:composer/guzzlehttp/guzzle@7.4.5
aliases CVE-2022-31091, GHSA-q559-8m2m-g699, GMS-2022-2529
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wzqf-k99e-vbeu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:composer/guzzlehttp/guzzle@6.5.8