Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/320946?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/320946?format=api",
    "vulnerability_id": "VCID-wsv2-95bs-kkdw",
    "summary": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python).  Supported versions that are affected are 9.0.0-9.2.0. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors.  Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in  unauthorized access to critical data or complete access to all MySQL Connectors accessible data. CVSS 3.1 Base Score 4.8 (Confidentiality impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N).",
    "aliases": [
        {
            "alias": "CVE-2025-30714"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/931435?format=api",
            "purl": "pkg:deb/debian/mysql-connector-python@9.3.0-1?distro=sid",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-python@9.3.0-1%3Fdistro=sid"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/931428?format=api",
            "purl": "pkg:deb/debian/mysql-connector-python@9.5.0-1?distro=sid",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/mysql-connector-python@9.5.0-1%3Fdistro=sid"
        }
    ],
    "affected_packages": [],
    "references": [
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30714",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.44999",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45087",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45085",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45107",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.4505",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45102",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45125",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45092",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45094",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45143",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00224",
                    "scoring_system": "epss",
                    "scoring_elements": "0.45136",
                    "published_at": "2026-04-18T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30714"
        },
        {
            "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103396",
            "reference_id": "1103396",
            "reference_type": "",
            "scores": [],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103396"
        },
        {
            "reference_url": "https://www.oracle.com/security-alerts/cpuapr2025.html",
            "reference_id": "cpuapr2025.html",
            "reference_type": "",
            "scores": [
                {
                    "value": "4.8",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N"
                },
                {
                    "value": "Track",
                    "scoring_system": "ssvc",
                    "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-16T14:08:18Z/"
                }
            ],
            "url": "https://www.oracle.com/security-alerts/cpuapr2025.html"
        }
    ],
    "weaknesses": [],
    "exploits": [],
    "severity_range_score": "4.8 - 4.8",
    "exploitability": null,
    "weighted_severity": null,
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wsv2-95bs-kkdw"
}