Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/349377?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/349377?format=api", "purl": "pkg:maven/org.apache.james/apache-mime4j@0.8.1", "type": "maven", "namespace": "org.apache.james", "name": "apache-mime4j", "version": "0.8.1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "0.8.9", "latest_non_vulnerable_version": "0.8.9", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/30719?format=api", "vulnerability_id": "VCID-4s4f-emvn-9bhh", "summary": "Apache James MIME4J vulnerable to information disclosure to local users\nUnproper laxist permissions on the temporary files used by MIME4J TempFileStorageProvider may lead to information disclosure to other local users. This issue affects Apache James MIME4J version 0.8.8 and prior versions. We recommend users to upgrade to MIME4j version 0.8.9 or later.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45787.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-45787.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45787", "reference_id": "", "reference_type": "", "scores": [ { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00892", "published_at": "2026-04-26T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00889", "published_at": "2026-04-29T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00888", "published_at": "2026-04-21T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00836", "published_at": "2026-04-16T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00835", "published_at": "2026-04-12T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00841", "published_at": "2026-04-18T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.0085", "published_at": "2026-04-09T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00853", "published_at": "2026-04-08T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00848", "published_at": "2026-04-07T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00847", "published_at": "2026-04-04T12:55:00Z" }, { "value": "9e-05", "scoring_system": "epss", "scoring_elements": "0.00846", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-45787" }, { "reference_url": "https://github.com/apache/james-mime4j", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/james-mime4j" }, { "reference_url": "https://github.com/apache/james-mime4j/blob/master/CHANGELOG.md#089---2022-12-30", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/james-mime4j/blob/master/CHANGELOG.md#089---2022-12-30" }, { "reference_url": "https://github.com/apache/james-mime4j/commit/021eb79ba312fe5a7f99fa867ee5350aa5533069", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/james-mime4j/commit/021eb79ba312fe5a7f99fa867ee5350aa5533069" }, { "reference_url": "https://issues.apache.org/jira/browse/MIME4J-322", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/MIME4J-322" }, { "reference_url": "https://lists.apache.org/thread/26s8p9stl1z261c4qw15bsq03tt7t0rj", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-09T19:31:06Z/" } ], "url": "https://lists.apache.org/thread/26s8p9stl1z261c4qw15bsq03tt7t0rj" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-45787" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916", "reference_id": "2158916", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2158916" }, { "reference_url": "https://github.com/advisories/GHSA-q84x-3476-8ff2", "reference_id": "GHSA-q84x-3476-8ff2", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-q84x-3476-8ff2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2705", "reference_id": "RHSA-2023:2705", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2705" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2706", "reference_id": "RHSA-2023:2706", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2706" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2707", "reference_id": "RHSA-2023:2707", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2707" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2710", "reference_id": "RHSA-2023:2710", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2710" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2713", "reference_id": "RHSA-2023:2713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3815", "reference_id": "RHSA-2023:3815", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3815" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/349385?format=api", "purl": "pkg:maven/org.apache.james/apache-mime4j@0.8.9", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/apache-mime4j@0.8.9" } ], "aliases": [ "CVE-2022-45787", "GHSA-q84x-3476-8ff2" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4s4f-emvn-9bhh" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.james/apache-mime4j@0.8.1" }