Lookup for vulnerable packages by Package URL.

GET /api/packages/934055?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/934055?format=api",
    "purl": "pkg:deb/debian/openssl@3.0.12-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "openssl",
    "version": "3.0.12-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "3.0.12-2",
    "latest_non_vulnerable_version": "3.6.2-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19612?format=api",
            "vulnerability_id": "VCID-h6n1-tsqt-17bw",
            "summary": "Generation of Weak Initialization Vector (IV)\nIssue summary: A bug has been identified in the processing of key and\ninitialisation vector (IV) lengths. This can lead to potential truncation\nor overruns during the initialisation of some symmetric ciphers.\n\nImpact summary: A truncation in the IV can result in non-uniqueness,\nwhich could result in loss of confidentiality for some cipher modes.\n\nWhen calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or\nEVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after\nthe key and IV have been established. Any alterations to the key length,\nvia the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter,\nwithin the OSSL_PARAM array will not take effect as intended, potentially\ncausing truncation or overreading of these values. The following ciphers\nand cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.\n\nFor the CCM, GCM and OCB cipher modes, truncation of the IV can result in\nloss of confidentiality. For example, when following NIST's SP 800-38D\nsection 8.2.1 guidance for constructing a deterministic IV for AES in\nGCM mode, truncation of the counter portion could lead to IV reuse.\n\nBoth truncations and overruns of the key and overruns of the IV will\nproduce incorrect results and could, in some cases, trigger a memory\nexception. However, these issues are not currently assessed as security\ncritical.\n\nChanging the key and/or IV lengths is not considered to be a common operation\nand the vulnerable API was recently introduced. Furthermore it is likely that\napplication developers will have spotted this problem during testing since\ndecryption would fail unless both peers in the communication were similarly\nvulnerable. For these reasons we expect the probability of an application being\nvulnerable to this to be quite low. However if an application is vulnerable then\nthis issue is considered very serious. For these reasons we have assessed this\nissue as Moderate severity overall.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because\nthe issue lies outside of the FIPS provider boundary.\n\nOpenSSL 3.1 and 3.0 is vulnerable to this issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5363.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5363.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5363",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89454",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89396",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89412",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89416",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89425",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89423",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89419",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89434",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89435",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89448",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89452",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89383",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04745",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89394",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89569",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5363"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0df40630850fb2740e6be6890bb905d3fc623b2d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:15:36Z/"
                        }
                    ],
                    "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0df40630850fb2740e6be6890bb905d3fc623b2d"
                },
                {
                    "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5f69f5c65e483928c4b28ed16af6e5742929f1ee",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:15:36Z/"
                        }
                    ],
                    "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=5f69f5c65e483928c4b28ed16af6e5742929f1ee"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231027-0010/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20231027-0010/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2023/dsa-5532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.debian.org/security/2023/dsa-5532"
                },
                {
                    "reference_url": "https://www.openssl.org/news/secadv/20231024.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-06-03T19:15:36Z/"
                        }
                    ],
                    "url": "https://www.openssl.org/news/secadv/20231024.txt"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/10/24/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2023/10/24/1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243839",
                    "reference_id": "2243839",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243839"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2848",
                    "reference_id": "AVG-2848",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2848"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2849",
                    "reference_id": "AVG-2849",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2849"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5363",
                    "reference_id": "CVE-2023-5363",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5363"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0310",
                    "reference_id": "RHSA-2024:0310",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0310"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0500",
                    "reference_id": "RHSA-2024:0500",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0500"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1383",
                    "reference_id": "RHSA-2024:1383",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1383"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2094",
                    "reference_id": "RHSA-2024:2094",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2094"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6450-1/",
                    "reference_id": "USN-6450-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6450-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933976?format=api",
                    "purl": "pkg:deb/debian/openssl@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933951?format=api",
                    "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-87vs-4p6w-xbgq"
                        },
                        {
                            "vulnerability": "VCID-8gde-1md7-5yak"
                        },
                        {
                            "vulnerability": "VCID-cef8-2p5t-bff7"
                        },
                        {
                            "vulnerability": "VCID-f2na-rtsu-ffad"
                        },
                        {
                            "vulnerability": "VCID-hgvf-vxhr-cye8"
                        },
                        {
                            "vulnerability": "VCID-wuwm-ksb1-6qd5"
                        },
                        {
                            "vulnerability": "VCID-zkc9-huk8-27bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934054?format=api",
                    "purl": "pkg:deb/debian/openssl@3.0.11-1~deb12u2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.11-1~deb12u2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/934055?format=api",
                    "purl": "pkg:deb/debian/openssl@3.0.12-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.12-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933949?format=api",
                    "purl": "pkg:deb/debian/openssl@3.0.18-1~deb12u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-8gde-1md7-5yak"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.18-1~deb12u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933953?format=api",
                    "purl": "pkg:deb/debian/openssl@3.5.5-1~deb13u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-7f9q-mhsr-8bfq"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.5.5-1~deb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/933952?format=api",
                    "purl": "pkg:deb/debian/openssl@3.6.1-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-74wu-sup9-cybb"
                        },
                        {
                            "vulnerability": "VCID-7f9q-mhsr-8bfq"
                        },
                        {
                            "vulnerability": "VCID-87vs-4p6w-xbgq"
                        },
                        {
                            "vulnerability": "VCID-cef8-2p5t-bff7"
                        },
                        {
                            "vulnerability": "VCID-f2na-rtsu-ffad"
                        },
                        {
                            "vulnerability": "VCID-hgvf-vxhr-cye8"
                        },
                        {
                            "vulnerability": "VCID-wuwm-ksb1-6qd5"
                        },
                        {
                            "vulnerability": "VCID-zkc9-huk8-27bc"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.6.1-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1062518?format=api",
                    "purl": "pkg:deb/debian/openssl@3.6.2-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.6.2-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2023-5363"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h6n1-tsqt-17bw"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.12-1%3Fdistro=trixie"
}