Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/6658?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6658?format=api", "vulnerability_id": "VCID-cte2-nf4m-t7hm", "summary": "Data Handling Stack Buffer Overflow\nThis package contains an overflow condition that is triggered as user-supplied input is not properly validated when handling specially crafted data. This may allow a remote attacker to cause a stack-based buffer overflow, resulting in a denial of service or potentially allowing the execution of arbitrary code.", "aliases": [ { "alias": "OSVDB-101157" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/19927?format=api", "purl": "pkg:gem/json@1.1.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-d6tn-s1q2-a3hc" }, { "vulnerability": "VCID-ebq1-gkhe-pua7" }, { "vulnerability": "VCID-xghz-9k48-bqej" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/json@1.1.0" } ], "affected_packages": [], "references": [ { "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/OSVDB-101157.yml", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/json/OSVDB-101157.yml" } ], "weaknesses": [], "exploits": [], "severity_range_score": null, "exploitability": null, "weighted_severity": null, "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cte2-nf4m-t7hm" }