Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/354651?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354651?format=api",
    "vulnerability_id": "VCID-4tn4-pbvn-h3hx",
    "summary": "GitPython has Command Injection via Git options bypass",
    "aliases": [
        {
            "alias": "GHSA-rpm5-65cw-6hj4"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/1077782?format=api",
            "purl": "pkg:pypi/gitpython@3.1.47",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/gitpython@3.1.47"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/30405?format=api",
            "purl": "pkg:pypi/gitpython@3.1.30",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-16je-k2yd-jydf"
                },
                {
                    "vulnerability": "VCID-43fr-z5nf-cqax"
                },
                {
                    "vulnerability": "VCID-4tn4-pbvn-h3hx"
                },
                {
                    "vulnerability": "VCID-qf8a-r6sz-qqf7"
                },
                {
                    "vulnerability": "VCID-y786-mwkd-u7ha"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:pypi/gitpython@3.1.30"
        }
    ],
    "references": [
        {
            "reference_url": "https://github.com/advisories/GHSA-rpm5-65cw-6hj4",
            "reference_id": "GHSA-rpm5-65cw-6hj4",
            "reference_type": "",
            "scores": [
                {
                    "value": "HIGH",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/advisories/GHSA-rpm5-65cw-6hj4"
        },
        {
            "reference_url": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-rpm5-65cw-6hj4",
            "reference_id": "GHSA-rpm5-65cw-6hj4",
            "reference_type": "",
            "scores": [
                {
                    "value": "HIGH",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-rpm5-65cw-6hj4"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 78,
            "name": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
            "description": "The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component."
        }
    ],
    "exploits": [],
    "severity_range_score": "7.0 - 8.9",
    "exploitability": null,
    "weighted_severity": null,
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4tn4-pbvn-h3hx"
}