Lookup for vulnerable packages by Package URL.

GET /api/packages/932705?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/932705?format=api",
    "purl": "pkg:deb/debian/node-undici@5.6.1%2Bdfsg1%2B~cs18.9.16-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "node-undici",
    "version": "5.6.1+dfsg1+~cs18.9.16-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "5.8.0+dfsg1+~cs18.9.16-1",
    "latest_non_vulnerable_version": "7.24.6+dfsg+~cs3.2.0-2",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54304?format=api",
            "vulnerability_id": "VCID-gxcz-6zkv-67dz",
            "summary": "ProxyAgent vulnerable to MITM\n### Description\n\n`Undici.ProxyAgent` never verifies the remote server's certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy's URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-text HTTP between Undici and the proxy server.\n\n### Impact\n\nThis affects all use of HTTPS via HTTP proxy using **`Undici.ProxyAgent`**  with Undici or Node's global `fetch`. In this case, it removes all HTTPS security from all requests sent using Undici's `ProxyAgent`, allowing trivial MitM attacks by anybody on the network path between the client and the target server (local network users, your ISP, the proxy, the target server's ISP, etc).\nThis less seriously affects HTTPS via HTTPS proxies. When you send HTTPS via a proxy to a remote server, the proxy can freely view or modify all HTTPS traffic unexpectedly (but only the proxy). \n\n### Patches\n\nThis issue was patched in Undici v5.5.1.\n\n### Workarounds\n\nAt the time of writing, the only workaround is to not use `ProxyAgent` as a dispatcher for TLS Connections.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.31848",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32152",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32191",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32014",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32065",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32095",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32098",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3206",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32029",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32062",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3204",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.32013",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-32210"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/nodejs/undici"
                },
                {
                    "reference_url": "https://github.com/nodejs/undici/security/advisories/GHSA-pgw7-wx7w-2w33",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/nodejs/undici/security/advisories/GHSA-pgw7-wx7w-2w33"
                },
                {
                    "reference_url": "https://hackerone.com/reports/1583680",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://hackerone.com/reports/1583680"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32210",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32210"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-pgw7-wx7w-2w33",
                    "reference_id": "GHSA-pgw7-wx7w-2w33",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-pgw7-wx7w-2w33"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/932705?format=api",
                    "purl": "pkg:deb/debian/node-undici@5.6.1%2Bdfsg1%2B~cs18.9.16-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.6.1%252Bdfsg1%252B~cs18.9.16-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/932700?format=api",
                    "purl": "pkg:deb/debian/node-undici@5.15.0%2Bdfsg1%2B~cs20.10.9.3-1%2Bdeb12u4?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1294-r4v2-3ud7"
                        },
                        {
                            "vulnerability": "VCID-g9bm-61bn-ryg5"
                        },
                        {
                            "vulnerability": "VCID-hgd1-7u6j-p7dh"
                        },
                        {
                            "vulnerability": "VCID-n6ew-t7g1-33gn"
                        },
                        {
                            "vulnerability": "VCID-pah5-gspe-hbbh"
                        },
                        {
                            "vulnerability": "VCID-ph2p-u33d-8yh3"
                        },
                        {
                            "vulnerability": "VCID-sy2z-sqgk-d7hg"
                        },
                        {
                            "vulnerability": "VCID-u8t3-4awy-k3fm"
                        },
                        {
                            "vulnerability": "VCID-xx5u-7mmp-akfs"
                        },
                        {
                            "vulnerability": "VCID-z653-vqsc-euer"
                        },
                        {
                            "vulnerability": "VCID-z7ac-jr58-gkfm"
                        },
                        {
                            "vulnerability": "VCID-zb3h-efqz-dff3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.15.0%252Bdfsg1%252B~cs20.10.9.3-1%252Bdeb12u4%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/932704?format=api",
                    "purl": "pkg:deb/debian/node-undici@7.3.0%2Bdfsg1%2B~cs24.12.11-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1294-r4v2-3ud7"
                        },
                        {
                            "vulnerability": "VCID-g9bm-61bn-ryg5"
                        },
                        {
                            "vulnerability": "VCID-hgd1-7u6j-p7dh"
                        },
                        {
                            "vulnerability": "VCID-n6ew-t7g1-33gn"
                        },
                        {
                            "vulnerability": "VCID-ph2p-u33d-8yh3"
                        },
                        {
                            "vulnerability": "VCID-sy2z-sqgk-d7hg"
                        },
                        {
                            "vulnerability": "VCID-vdca-exd1-rfce"
                        },
                        {
                            "vulnerability": "VCID-z7ac-jr58-gkfm"
                        },
                        {
                            "vulnerability": "VCID-zb3h-efqz-dff3"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.3.0%252Bdfsg1%252B~cs24.12.11-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/932702?format=api",
                    "purl": "pkg:deb/debian/node-undici@7.18.2%2Bdfsg%2B~cs3.2.0-1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1294-r4v2-3ud7"
                        },
                        {
                            "vulnerability": "VCID-hgd1-7u6j-p7dh"
                        },
                        {
                            "vulnerability": "VCID-n6ew-t7g1-33gn"
                        },
                        {
                            "vulnerability": "VCID-ph2p-u33d-8yh3"
                        },
                        {
                            "vulnerability": "VCID-sy2z-sqgk-d7hg"
                        },
                        {
                            "vulnerability": "VCID-vdca-exd1-rfce"
                        },
                        {
                            "vulnerability": "VCID-z7ac-jr58-gkfm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.18.2%252Bdfsg%252B~cs3.2.0-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/932703?format=api",
                    "purl": "pkg:deb/debian/node-undici@7.24.6%2Bdfsg%2B~cs3.2.0-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@7.24.6%252Bdfsg%252B~cs3.2.0-2%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2022-32210",
                "GHSA-pgw7-wx7w-2w33",
                "GMS-2022-2246"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gxcz-6zkv-67dz"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/node-undici@5.6.1%252Bdfsg1%252B~cs18.9.16-1%3Fdistro=trixie"
}