Lookup for vulnerable packages by Package URL.

GET /api/packages/84820?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/84820?format=api",
    "purl": "pkg:ebuild/www-apps/egroupware@1.4.004",
    "type": "ebuild",
    "namespace": "www-apps",
    "name": "egroupware",
    "version": "1.4.004",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/14153?format=api",
            "vulnerability_id": "VCID-ba3v-4d8e-mfgx",
            "summary": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nThe _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.",
            "references": [
                {
                    "reference_url": "http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77935",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77941",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77942",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77905",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77921",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77968",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77853",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77845",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77894",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77889",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77862",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01086",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7788",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-1502"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41435",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41435"
                },
                {
                    "reference_url": "https://github.com/moodle/moodle",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/moodle/moodle"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/658-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/658-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/658-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/658-1/"
                },
                {
                    "reference_url": "https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424"
                },
                {
                    "reference_url": "https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017"
                },
                {
                    "reference_url": "https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018"
                },
                {
                    "reference_url": "https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167"
                },
                {
                    "reference_url": "https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400"
                },
                {
                    "reference_url": "https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446"
                },
                {
                    "reference_url": "https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986"
                },
                {
                    "reference_url": "https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073"
                },
                {
                    "reference_url": "https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491"
                },
                {
                    "reference_url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html"
                },
                {
                    "reference_url": "http://www.debian.org/security/2008/dsa-1691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2008/dsa-1691"
                },
                {
                    "reference_url": "http://www.debian.org/security/2009/dsa-1871",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2009/dsa-1871"
                },
                {
                    "reference_url": "http://www.egroupware.org/changelog",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.egroupware.org/changelog"
                },
                {
                    "reference_url": "http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110"
                },
                {
                    "reference_url": "http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2008/07/08/14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2008/07/08/14"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=454246",
                    "reference_id": "454246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=454246"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243",
                    "reference_id": "504243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1502",
                    "reference_id": "CVE-2008-1502",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-1502"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-v759-3wr5-p294",
                    "reference_id": "GHSA-v759-3wr5-p294",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-v759-3wr5-p294"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-04",
                    "reference_id": "GLSA-200805-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84820?format=api",
                    "purl": "pkg:ebuild/www-apps/egroupware@1.4.004",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-apps/egroupware@1.4.004"
                }
            ],
            "aliases": [
                "CVE-2008-1502",
                "GHSA-v759-3wr5-p294"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ba3v-4d8e-mfgx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60206?format=api",
            "vulnerability_id": "VCID-zsh3-98k8-1ycj",
            "summary": "Multiple vulnerabilities in eGroupWare may lead to execution of arbitrary\n    PHP code, the ability to upload malicious files and cross-site scripting\n    attacks.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6693",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66968",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66993",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67018",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67049",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67035",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67004",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67037",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67052",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67033",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00526",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67053",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2008-2041"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/200805-04",
                    "reference_id": "GLSA-200805-04",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/200805-04"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84820?format=api",
                    "purl": "pkg:ebuild/www-apps/egroupware@1.4.004",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-apps/egroupware@1.4.004"
                }
            ],
            "aliases": [
                "CVE-2008-2041"
            ],
            "risk_score": null,
            "exploitability": null,
            "weighted_severity": null,
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zsh3-98k8-1ycj"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-apps/egroupware@1.4.004"
}