Lookup for vulnerable packages by Package URL.

GET /api/packages/372091?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/372091?format=api",
    "purl": "pkg:alpm/archlinux/keycloak@12.0.4-1",
    "type": "alpm",
    "namespace": "archlinux",
    "name": "keycloak",
    "version": "12.0.4-1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "14.0.0-1",
    "latest_non_vulnerable_version": "16.0.0-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53187?format=api",
            "vulnerability_id": "VCID-14c3-xa9j-mbab",
            "summary": "Incorrect implementation of lockout feature in Keycloak\nA flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3513.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3513.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/CVE-2021-3513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/CVE-2021-3513"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41881",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42174",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42225",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42131",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42077",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42073",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41991",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41852",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41925",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4194",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.41856",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4213",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42189",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42216",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42156",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42207",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42214",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42238",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00201",
                            "scoring_system": "epss",
                            "scoring_elements": "0.42201",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3513"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953439",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1953439"
                },
                {
                    "reference_url": "https://github.com/keycloak/keycloak",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/keycloak/keycloak"
                },
                {
                    "reference_url": "https://github.com/keycloak/keycloak/pull/7976",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/keycloak/keycloak/pull/7976"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3513",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3513"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-6",
                    "reference_id": "ASA-202105-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1926",
                    "reference_id": "AVG-1926",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1926"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-xv7h-95r7-595j",
                    "reference_id": "GHSA-xv7h-95r7-595j",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-xv7h-95r7-595j"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3527",
                    "reference_id": "RHSA-2021:3527",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3527"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3528",
                    "reference_id": "RHSA-2021:3528",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3528"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3529",
                    "reference_id": "RHSA-2021:3529",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3529"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3534",
                    "reference_id": "RHSA-2021:3534",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3534"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/372092?format=api",
                    "purl": "pkg:alpm/archlinux/keycloak@13.0.0-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1jc1-3gjk-m3bz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@13.0.0-1"
                }
            ],
            "aliases": [
                "CVE-2021-3513",
                "GHSA-xv7h-95r7-595j"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-14c3-xa9j-mbab"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/46842?format=api",
            "vulnerability_id": "VCID-546n-kc1p-cyhm",
            "summary": "Code injection in keycloak\nA flaw was found in keycloak. The new account console in keycloak can allow malicious code to be executed using the referrer URL. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20222.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20222.json"
                },
                {
                    "reference_url": "https://access.redhat.com/security/cve/cve-2021-20222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/security/cve/cve-2021-20222"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63292",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63227",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63207",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63228",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63242",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63208",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63252",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63304",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63265",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63096",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63155",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63185",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6315",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63202",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63219",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63236",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63221",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0044",
                            "scoring_system": "epss",
                            "scoring_elements": "0.63184",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20222"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924606",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1924606"
                },
                {
                    "reference_url": "https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/keycloak/keycloak/commit/3b80eee5bfdf2b80c47465c0f2eaf70074808741"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20222",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20222"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-6",
                    "reference_id": "ASA-202105-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1926",
                    "reference_id": "AVG-1926",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1926"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-2mq8-99q7-55wx",
                    "reference_id": "GHSA-2mq8-99q7-55wx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-2mq8-99q7-55wx"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/372092?format=api",
                    "purl": "pkg:alpm/archlinux/keycloak@13.0.0-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1jc1-3gjk-m3bz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@13.0.0-1"
                }
            ],
            "aliases": [
                "CVE-2021-20222",
                "GHSA-2mq8-99q7-55wx"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-546n-kc1p-cyhm"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/80754?format=api",
            "vulnerability_id": "VCID-djwn-hkwg-g3gk",
            "summary": "keycloak: reusable \"state\" parameter at redirect_uri endpoint enables possibility of replay attacks",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14302.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-14302.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14302",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36059",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36254",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36287",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36123",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36172",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3619",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36196",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36159",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36133",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36175",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3616",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36108",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35878",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35846",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35759",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35642",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35711",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35733",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35641",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00154",
                            "scoring_system": "epss",
                            "scoring_elements": "0.35664",
                            "published_at": "2026-05-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-14302"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849584",
                    "reference_id": "1849584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849584"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-6",
                    "reference_id": "ASA-202105-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1926",
                    "reference_id": "AVG-1926",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1926"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14302",
                    "reference_id": "CVE-2020-14302",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-14302"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0967",
                    "reference_id": "RHSA-2021:0967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0967"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0968",
                    "reference_id": "RHSA-2021:0968",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0968"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0969",
                    "reference_id": "RHSA-2021:0969",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0969"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0974",
                    "reference_id": "RHSA-2021:0974",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0974"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/372092?format=api",
                    "purl": "pkg:alpm/archlinux/keycloak@13.0.0-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1jc1-3gjk-m3bz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@13.0.0-1"
                }
            ],
            "aliases": [
                "CVE-2020-14302"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-djwn-hkwg-g3gk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/53344?format=api",
            "vulnerability_id": "VCID-e9qa-sy57-fqby",
            "summary": "Temporary Directory Hijacking Vulnerability in Keycloak\nA flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality and integrity.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20202.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20202.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14056",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13879",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13871",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1395",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13986",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13961",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13894",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13776",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13935",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14022",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14013",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14047",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14128",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14184",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13999",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14081",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14134",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14078",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.14036",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00046",
                            "scoring_system": "epss",
                            "scoring_elements": "0.13984",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20202"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1922128"
                },
                {
                    "reference_url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-7gf3-89f6-823j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-7gf3-89f6-823j"
                },
                {
                    "reference_url": "https://issues.redhat.com/browse/KEYCLOAK-17000",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://issues.redhat.com/browse/KEYCLOAK-17000"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20202",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20202"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-6",
                    "reference_id": "ASA-202105-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1926",
                    "reference_id": "AVG-1926",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1926"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-6xp6-fmc8-pmmr",
                    "reference_id": "GHSA-6xp6-fmc8-pmmr",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-6xp6-fmc8-pmmr"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/372092?format=api",
                    "purl": "pkg:alpm/archlinux/keycloak@13.0.0-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1jc1-3gjk-m3bz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@13.0.0-1"
                }
            ],
            "aliases": [
                "CVE-2021-20202",
                "GHSA-6xp6-fmc8-pmmr"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e9qa-sy57-fqby"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55526?format=api",
            "vulnerability_id": "VCID-u5ba-kpd5-67bm",
            "summary": "Keycloak discloses information without authentication\nA flaw was found in keycloak in versions prior to 13.0.0. The client registration endpoint allows fetching information about PUBLIC clients (like client secret) without authentication which could be an issue if the same PUBLIC client changed to CONFIDENTIAL later. The highest threat from this vulnerability is to data confidentiality.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27838.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27838.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99367",
                            "published_at": "2026-05-12T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99354",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99355",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99356",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99357",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9936",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99359",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99361",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99363",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99364",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99365",
                            "published_at": "2026-05-11T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99349",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99352",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.85144",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99353",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27838"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1906797"
                },
                {
                    "reference_url": "https://github.com/keycloak/keycloak/commit/9356843c6c3d7097d010b3bb6f91e25fcaba378c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/keycloak/keycloak/commit/9356843c6c3d7097d010b3bb6f91e25fcaba378c"
                },
                {
                    "reference_url": "https://github.com/keycloak/keycloak/pull/7790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/keycloak/keycloak/pull/7790"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27838"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202105-6",
                    "reference_id": "ASA-202105-6",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202105-6"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1926",
                    "reference_id": "AVG-1926",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1926"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-pcv5-m2wh-66j3",
                    "reference_id": "GHSA-pcv5-m2wh-66j3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-pcv5-m2wh-66j3"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/372092?format=api",
                    "purl": "pkg:alpm/archlinux/keycloak@13.0.0-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-1jc1-3gjk-m3bz"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@13.0.0-1"
                }
            ],
            "aliases": [
                "CVE-2020-27838",
                "GHSA-pcv5-m2wh-66j3"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u5ba-kpd5-67bm"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/keycloak@12.0.4-1"
}