Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/46982?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46982?format=api",
    "vulnerability_id": "VCID-9u45-d21t-b7fq",
    "summary": "HTTP Request Smuggling in akka-http-core\nA vulnerable Akka HTTP server will accept a malformed message and hand it over to the user. If the user application proxies this message to another server unchanged and that server also accepts that message but interprets it as two HTTP messages, the second message has reached the second server without having been inspected by the proxy.",
    "aliases": [
        {
            "alias": "CVE-2021-23339"
        },
        {
            "alias": "GHSA-2w7w-2j92-44hx"
        }
    ],
    "fixed_packages": [],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/41217?format=api",
            "purl": "pkg:maven/com.typesafe.akka/akka-http-core@10.2.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-9u45-d21t-b7fq"
                },
                {
                    "vulnerability": "VCID-w7g1-y7u7-z3fg"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/com.typesafe.akka/akka-http-core@10.2.0"
        }
    ],
    "references": [
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23339",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43499",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43592",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43618",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43555",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43606",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43611",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43629",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43598",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43582",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43643",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43632",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43567",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00211",
                    "scoring_system": "epss",
                    "scoring_elements": "0.43529",
                    "published_at": "2026-04-01T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23339"
        },
        {
            "reference_url": "https://doc.akka.io/docs/akka-http/10.1/security/2021-02-24-incorrect-handling-of-Transfer-Encoding-header.html",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://doc.akka.io/docs/akka-http/10.1/security/2021-02-24-incorrect-handling-of-Transfer-Encoding-header.html"
        },
        {
            "reference_url": "https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/akka/akka-http/commit/e3a4935151c91cee28e65e6b894dd50839ef9d34"
        },
        {
            "reference_url": "https://github.com/akka/akka-http/pull/3754%23issuecomment-779265201",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/akka/akka-http/pull/3754%23issuecomment-779265201"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23339",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23339"
        },
        {
            "reference_url": "https://snyk.io/vuln/SNYK-JAVA-COMTYPESAFEAKKA-1075043",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://snyk.io/vuln/SNYK-JAVA-COMTYPESAFEAKKA-1075043"
        },
        {
            "reference_url": "https://github.com/advisories/GHSA-2w7w-2j92-44hx",
            "reference_id": "GHSA-2w7w-2j92-44hx",
            "reference_type": "",
            "scores": [
                {
                    "value": "MODERATE",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/advisories/GHSA-2w7w-2j92-44hx"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 444,
            "name": "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')",
            "description": "The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination."
        },
        {
            "cwe_id": 1035,
            "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities",
            "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."
        },
        {
            "cwe_id": 937,
            "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities",
            "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."
        }
    ],
    "exploits": [],
    "severity_range_score": "4.0 - 6.9",
    "exploitability": "0.5",
    "weighted_severity": "6.2",
    "risk_score": 3.1,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9u45-d21t-b7fq"
}