Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/77945?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/77945?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@89.0", "type": "ebuild", "namespace": "www-client", "name": "firefox-bin", "version": "89.0", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "91.6.0", "latest_non_vulnerable_version": "137.0.1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49747?format=api", "vulnerability_id": "VCID-2vy5-zebk-1bgk", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29961", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54695", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54631", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54705", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54652", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54746", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54738", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54716", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54757", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54737", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.5471", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54729", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29961" }, { "reference_url": "https://security.archlinux.org/ASA-202106-3", "reference_id": "ASA-202106-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-3" }, { "reference_url": "https://security.archlinux.org/AVG-2018", "reference_id": "AVG-2018", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2018" }, { "reference_url": "https://security.gentoo.org/glsa/202107-09", "reference_id": "GLSA-202107-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-09" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23", "reference_id": "mfsa2021-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23" }, { "reference_url": "https://usn.ubuntu.com/4978-1/", "reference_id": "USN-4978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4978-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77944?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@78.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@78.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/77945?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@89.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@89.0" } ], "aliases": [ "CVE-2021-29961" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2vy5-zebk-1bgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49746?format=api", "vulnerability_id": "VCID-7knr-6rqg-8kcw", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29960", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62235", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.6207", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62241", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62186", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.6213", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62162", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62181", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62198", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62216", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62206", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62185", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.6223", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62236", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62221", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62231", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00424", "scoring_system": "epss", "scoring_elements": "0.62248", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29960" }, { "reference_url": "https://security.archlinux.org/ASA-202106-3", "reference_id": "ASA-202106-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-3" }, { "reference_url": "https://security.archlinux.org/AVG-2018", "reference_id": "AVG-2018", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2018" }, { "reference_url": "https://security.gentoo.org/glsa/202107-09", "reference_id": "GLSA-202107-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-09" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23", "reference_id": "mfsa2021-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23" }, { "reference_url": "https://usn.ubuntu.com/4978-1/", "reference_id": "USN-4978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4978-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77944?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@78.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@78.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/77945?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@89.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@89.0" } ], "aliases": [ "CVE-2021-29960" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7knr-6rqg-8kcw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49748?format=api", "vulnerability_id": "VCID-vysb-zn1g-tuf5", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29966", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64547", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64372", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64525", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.645", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64426", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64456", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64464", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64495", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64483", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64455", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64489", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64501", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64493", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64513", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00467", "scoring_system": "epss", "scoring_elements": "0.64526", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29966" }, { "reference_url": "https://security.archlinux.org/ASA-202106-3", "reference_id": "ASA-202106-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-3" }, { "reference_url": "https://security.archlinux.org/AVG-2018", "reference_id": "AVG-2018", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2018" }, { "reference_url": "https://security.gentoo.org/glsa/202107-09", "reference_id": "GLSA-202107-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-09" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23", "reference_id": "mfsa2021-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23" }, { "reference_url": "https://usn.ubuntu.com/4978-1/", "reference_id": "USN-4978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4978-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77944?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@78.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@78.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/77945?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@89.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@89.0" } ], "aliases": [ "CVE-2021-29966" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vysb-zn1g-tuf5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49745?format=api", "vulnerability_id": "VCID-y2pv-1tm3-nqak", "summary": "Multiple vulnerabilities have been found in Mozilla Firefox, the\n worst of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29959", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54695", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54631", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54705", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54652", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54724", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54694", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54746", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54754", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54738", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54716", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54757", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54737", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.5471", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00316", "scoring_system": "epss", "scoring_elements": "0.54729", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-29959" }, { "reference_url": "https://security.archlinux.org/ASA-202106-3", "reference_id": "ASA-202106-3", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202106-3" }, { "reference_url": "https://security.archlinux.org/AVG-2018", "reference_id": "AVG-2018", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2018" }, { "reference_url": "https://security.gentoo.org/glsa/202107-09", "reference_id": "GLSA-202107-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-09" }, { "reference_url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23", "reference_id": "mfsa2021-23", "reference_type": "", "scores": [ { "value": "high", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.mozilla.org/en-US/security/advisories/mfsa2021-23" }, { "reference_url": "https://usn.ubuntu.com/4978-1/", "reference_id": "USN-4978-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4978-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/77944?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@78.11.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@78.11.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/77945?format=api", "purl": "pkg:ebuild/www-client/firefox-bin@89.0", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@89.0" } ], "aliases": [ "CVE-2021-29959" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y2pv-1tm3-nqak" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/firefox-bin@89.0" }