Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/971162?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/971162?format=api", "purl": "pkg:apk/alpine/openvpn@0?arch=x86&distroversion=v3.19&reponame=main", "type": "apk", "namespace": "alpine", "name": "openvpn", "version": "0", "qualifiers": { "arch": "x86", "distroversion": "v3.19", "reponame": "main" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.4.6-r0", "latest_non_vulnerable_version": "2.6.16-r0", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/233008?format=api", "vulnerability_id": "VCID-7gv4-n846-xqc9", "summary": "The Aviatrix OpenVPN client through 2.5.7 on Linux, macOS, and Windows is vulnerable when OpenSSL parameters are altered from the issued value set; the parameters could allow unauthorized third-party libraries to load.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7224", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70074", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70087", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70102", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70078", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70142", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70165", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70151", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70138", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70181", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70191", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70169", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.7022", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00623", "scoring_system": "epss", "scoring_elements": "0.70227", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7224" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/971162?format=api", "purl": "pkg:apk/alpine/openvpn@0?arch=x86&distroversion=v3.19&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openvpn@0%3Farch=x86&distroversion=v3.19&reponame=main" } ], "aliases": [ "CVE-2020-7224" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gv4-n846-xqc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/224732?format=api", "vulnerability_id": "VCID-edva-vnmb-6qau", "summary": "Arbitrary File Write exists in Aviatrix VPN Client 2.8.2 and earlier. The VPN service writes logs to a location that is world writable and can be leveraged to gain write access to any file on the system.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27569", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.57933", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58018", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58041", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58016", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58071", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58074", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58091", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58068", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58047", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58077", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58078", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58054", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.5802", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00358", "scoring_system": "epss", "scoring_elements": "0.58034", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-27569" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/971162?format=api", "purl": "pkg:apk/alpine/openvpn@0?arch=x86&distroversion=v3.19&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openvpn@0%3Farch=x86&distroversion=v3.19&reponame=main" } ], "aliases": [ "CVE-2020-27569" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edva-vnmb-6qau" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/224477?format=api", "vulnerability_id": "VCID-w1eu-fbhk-pucv", "summary": "OpenVPN version 2.4.0 through 2.6.10 on Windows allows an external, lesser privileged process to create a named pipe which the OpenVPN GUI component would connect to allowing it to escalate its privileges", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4877", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46186", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46308", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46304", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46248", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.4623", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46221", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.4624", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46188", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46244", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46246", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.4627", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46241", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00234", "scoring_system": "epss", "scoring_elements": "0.46251", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4877" }, { "reference_url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-4877", "reference_id": "CVE-2024-4877", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T13:23:24Z/" } ], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-4877" }, { "reference_url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", "reference_id": "msg07634.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-04T13:23:24Z/" } ], "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/971162?format=api", "purl": "pkg:apk/alpine/openvpn@0?arch=x86&distroversion=v3.19&reponame=main", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openvpn@0%3Farch=x86&distroversion=v3.19&reponame=main" } ], "aliases": [ "CVE-2024-4877" ], "risk_score": null, "exploitability": null, "weighted_severity": null, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w1eu-fbhk-pucv" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openvpn@0%3Farch=x86&distroversion=v3.19&reponame=main" }