Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/401312?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/401312?format=api", "purl": "pkg:apk/alpine/mariadb@10.5.13-r0?arch=mips64&distroversion=v3.13&reponame=main", "type": "apk", "namespace": "alpine", "name": "mariadb", "version": "10.5.13-r0", "qualifiers": { "arch": "mips64", "distroversion": "v3.13", "reponame": "main" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "10.5.15-r0", "latest_non_vulnerable_version": "10.5.17-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79962?format=api", "vulnerability_id": "VCID-36fa-z98h-3yfk", "summary": "mysql: InnoDB unspecified vulnerability (CPU Oct 2021)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35604.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43022", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42719", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43049", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43036", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43071", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43037", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.4308", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43068", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.43004", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42938", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42939", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00207", "scoring_system": "epss", "scoring_elements": "0.42858", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-35604" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35604" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101", "reference_id": "2016101", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016101" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/", "reference_id": "2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2UTW5KMPPDKIMGB4ULE2HS22HYLVKYIH/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/", "reference_id": "5MLAXYFLUDC636S46X34USCLDZAOFBM2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5MLAXYFLUDC636S46X34USCLDZAOFBM2/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003/", "reference_id": "ntap-20211022-0003", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/", "reference_id": "PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PRCU3RTIPVKPC3GMC76YW7DJEXUEY6FG/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1007", "reference_id": "RHSA-2022:1007", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1007" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1010", "reference_id": "RHSA-2022:1010", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1010" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1556", "reference_id": "RHSA-2022:1556", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1556" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1557", "reference_id": "RHSA-2022:1557", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1557" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4818", "reference_id": "RHSA-2022:4818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6518", "reference_id": "RHSA-2022:6518", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6518" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:7119", "reference_id": "RHSA-2022:7119", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:7119" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6821", "reference_id": "RHSA-2023:6821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6821" }, { "reference_url": "https://usn.ubuntu.com/5123-1/", "reference_id": "USN-5123-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-1/" }, { "reference_url": "https://usn.ubuntu.com/5123-2/", "reference_id": "USN-5123-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5123-2/" }, { "reference_url": "https://usn.ubuntu.com/5170-1/", "reference_id": "USN-5170-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5170-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/", "reference_id": "VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VGR5ZTB5QEDRRC6G5U6TFNCIVBBKGS5J/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/", "reference_id": "XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-25T19:14:38Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XF3ZFPL3JJ26YRUGXLXQZYJBLZV3WC2C/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/401312?format=api", "purl": "pkg:apk/alpine/mariadb@10.5.13-r0?arch=mips64&distroversion=v3.13&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.5.13-r0%3Farch=mips64&distroversion=v3.13&reponame=main" } ], "aliases": [ "CVE-2021-35604" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-36fa-z98h-3yfk" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/mariadb@10.5.13-r0%3Farch=mips64&distroversion=v3.13&reponame=main" }