Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/6658?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6658?format=api",
    "vulnerability_id": "VCID-cte2-nf4m-t7hm",
    "summary": "Data Handling Stack Buffer Overflow\nThis package contains an overflow condition that is triggered as user-supplied input is not properly validated when handling specially crafted data. This may allow a remote attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.",
    "aliases": [
        {
            "alias": "OSVDB-101157"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/19927?format=api",
            "purl": "pkg:gem/json@1.1.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-d6tn-s1q2-a3hc"
                },
                {
                    "vulnerability": "VCID-ebq1-gkhe-pua7"
                },
                {
                    "vulnerability": "VCID-xghz-9k48-bqej"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/json@1.1.0"
        }
    ],
    "affected_packages": [],
    "references": [
        {
            "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/OSVDB-101157.yml",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/OSVDB-101157.yml"
        }
    ],
    "weaknesses": [],
    "exploits": [],
    "severity_range_score": null,
    "exploitability": null,
    "weighted_severity": null,
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cte2-nf4m-t7hm"
}