Lookup for vulnerable packages by Package URL.

GET /api/packages/660359?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/660359?format=api",
    "purl": "pkg:nuget/NuGet.Packaging@5.9.1",
    "type": "nuget",
    "namespace": "",
    "name": "NuGet.Packaging",
    "version": "5.9.1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "5.11.7",
    "latest_non_vulnerable_version": "7.3.1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15504?format=api",
            "vulnerability_id": "VCID-2zs5-gfxg-efgb",
            "summary": "NuGet Client Security Feature Bypass Vulnerability\n### Description\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 7.0 and .NET 8.0. This advisory also provides guidance on what developers can do to update their applications to address this vulnerability. \n\nA security feature bypass vulnerability exists when Microsoft .NET Framework-based applications use X.509 chain building APIs but do not completely validate the X.509 certificate due to a logic flaw. An attacker could present an arbitrary untrusted certificate with malformed signatures, triggering a bug in the framework. The framework will correctly report that X.509 chain building failed, but it will return an incorrect reason code for the failure. Applications which utilize this reason code to make their own chain building trust decisions may inadvertently treat this scenario as a successful chain build. This could allow an adversary to subvert the app's typical authentication logic. \n\n### Affected software\n#### NuGet & NuGet Packages\n- Any NuGet.exe, NuGet.CommandLine, NuGet.Packaging 6.8.0 version or earlier. \n- Any NuGet.exe, NuGet.CommandLine, NuGet.Packaging 6.7.0 version or earlier. \n- Any NuGet.exe, NuGet.CommandLine, NuGet.Packaging 6.6.1 version or earlier. \n- Any NuGet.exe, NuGet.CommandLine, NuGet.Packaging 6.4.2 version or earlier. \n- Any NuGet.exe, NuGet.CommandLine, NuGet.Packaging 6.3.3 version or earlier. \n- Any NuGet.exe, NuGet.CommandLine, NuGet.Packaging 6.0.5 version or earlier. \n- Any NuGet.exe, NuGet.CommandLine, NuGet.Packaging 5.11.5 version or earlier. \n\n#### .NET SDK(s)\n- Any .NET SDK 6.0.126 or earlier, or 6.0.418 or earlier.\n- Any .NET SDK 7.0.115 or earlier, or 7.0.312 or earlier, or 7.0.405 or earlier.\n- Any .NET SDK 8.0.101 or earlier.\n \n### Patches\nTo fix the issue, please install the latest version of .NET 6.0, .NET 7.0 or .NET 8.0 and NuGet (NuGet.exe, NuGet.CommandLine, NuGet. Packaging versions). If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs. \n- If you're using NuGet.exe 6.8.0 or lower, you should download and install 6.8.1 from https://dist.nuget.org/win-x86-commandline/v6.8.1/nuget.exe. \n- If you're using NuGet.exe 6.7.0 or lower, you should download and install 6.7.1 from https://dist.nuget.org/win-x86-commandline/v6.7.1/nuget.exe. \n- If you're using NuGet.exe 6.6.1 or lower, you should download and install 6.6.2 from https://dist.nuget.org/win-x86-commandline/v6.6.2/nuget.exe. \n- If you're using NuGet.exe 6.4.2 or lower, you should download and install 6.4.3 from https://dist.nuget.org/win-x86-commandline/v6.4.3/nuget.exe. \n- If you're using NuGet.exe 6.3.3 or lower, you should download and install 6.3.4 from https://dist.nuget.org/win-x86-commandline/v6.3.4/nuget.exe. \n- If you're using NuGet.exe 6.0.5 or lower, you should download and install 6.0.6 from https://dist.nuget.org/win-x86-commandline/v6.0.6/nuget.exe. \n- If you're using NuGet.exe 5.11.5 or lower, you should download and install 5.11.6 from https://dist.nuget.org/win-x86-commandline/v5.11.6/nuget.exe. \n- If you're using .NET 8.0, you should download and install .NET 8.0.102 SDK (for Visual Studio 2022 v17.8) from https://dotnet.microsoft.com/download/dotnet-core/8.0 . \n- If you're using .NET 7.0, you should download and install SDK 7.0.116 (for Visual Studio 2022 v17.4), or SDK 7.0.313 (for Visual Studio 2022 v17.6), or 7.0.406 (for Visual Studio 2022 v17.7) from https://dotnet.microsoft.com/download/dotnet-core/7.0 . \n- If you're using .NET 6.0, you should download and install SDK 6.0.127 or SDK 6.0.419 (for Visual Studio 2022 v17.3) from https://dotnet.microsoft.com/download/dotnet-core/6.0 . \n\n### Other details\nAnnouncement for this issue can be found at https://github.com/NuGet/Announcements/issues/71 \n\nMSRC details for this can be found at [CVE-2024-0057 - Security Update Guide - Microsoft - NET, .NET Framework, and Visual Studio Security Feature Bypass Vulnerability](https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0057.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0057.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87914",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87794",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87805",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87808",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8783",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87836",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87848",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87843",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87841",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87855",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87854",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8785",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87866",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87872",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87869",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87882",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.03635",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87897",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0057"
                },
                {
                    "reference_url": "https://github.com/NuGet/NuGet.Client",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/NuGet/NuGet.Client"
                },
                {
                    "reference_url": "https://github.com/NuGet/NuGet.Client/commit/3333f352ec47f0ebb489f20353dea7017f6cb00c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/NuGet/NuGet.Client/commit/3333f352ec47f0ebb489f20353dea7017f6cb00c"
                },
                {
                    "reference_url": "https://github.com/NuGet/NuGet.Client/commit/5e1ba955cca14328d2cb5723f211d5fbc9bcacb3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/NuGet/NuGet.Client/commit/5e1ba955cca14328d2cb5723f211d5fbc9bcacb3"
                },
                {
                    "reference_url": "https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-68w7-72jg-6qpp",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-68w7-72jg-6qpp"
                },
                {
                    "reference_url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-0057"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0057",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0057"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240208-0007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240208-0007"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255386",
                    "reference_id": "2255386",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255386"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-68w7-72jg-6qpp",
                    "reference_id": "GHSA-68w7-72jg-6qpp",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-68w7-72jg-6qpp"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0150",
                    "reference_id": "RHSA-2024:0150",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0150"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0151",
                    "reference_id": "RHSA-2024:0151",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0151"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0152",
                    "reference_id": "RHSA-2024:0152",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0152"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0156",
                    "reference_id": "RHSA-2024:0156",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0156"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0157",
                    "reference_id": "RHSA-2024:0157",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0157"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0158",
                    "reference_id": "RHSA-2024:0158",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0158"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0255",
                    "reference_id": "RHSA-2024:0255",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0255"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6578-1/",
                    "reference_id": "USN-6578-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6578-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54587?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@5.11.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-xxrj-7szv-s3cm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@5.11.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54591?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@6.0.6",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@6.0.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/660369?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@6.1.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@6.1.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54594?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@6.3.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@6.3.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54599?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@6.4.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@6.4.3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/660373?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@6.5.0",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@6.5.0"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54603?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@6.6.2",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@6.6.2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54610?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@6.7.1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@6.7.1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54612?format=api",
                    "purl": "pkg:nuget/NuGet.Packaging@6.8.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-xxrj-7szv-s3cm"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@6.8.1"
                }
            ],
            "aliases": [
                "CVE-2024-0057",
                "GHSA-68w7-72jg-6qpp"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2zs5-gfxg-efgb"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/NuGet.Packaging@5.9.1"
}