Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/12668?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12668?format=api",
    "vulnerability_id": "VCID-6xux-6rk7-gygr",
    "summary": "Insufficient Session Expiration\nIf NiFi Registry to uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to hours after logging out to make API requests to NiFi Registry.",
    "aliases": [
        {
            "alias": "CVE-2020-9482"
        },
        {
            "alias": "GHSA-rcwj-2hj2-vmjj"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/45511?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.7.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-xhjy-xmhq-abh7"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.7.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/80595?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.7.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-xhjy-xmhq-abh7"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.7.0"
        }
    ],
    "affected_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/45505?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.1.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.1.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/280967?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.3.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.3.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/280968?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.4.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.4.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/45508?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.5.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-core@0.5.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/143235?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.1.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.1.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/205238?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.2.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.2.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/205239?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.3.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.3.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/205240?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.4.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.4.0"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/143236?format=api",
            "purl": "pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.5.0",
            "is_vulnerable": true,
            "affected_by_vulnerabilities": [
                {
                    "vulnerability": "VCID-6xux-6rk7-gygr"
                }
            ],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.nifi.registry/nifi-registry-web-api@0.5.0"
        }
    ],
    "references": [
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9482",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76183",
                    "published_at": "2026-05-14T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76025",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76027",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76012",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.7605",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76059",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76071",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76078",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76107",
                    "published_at": "2026-05-07T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.7613",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76118",
                    "published_at": "2026-05-11T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76133",
                    "published_at": "2026-05-12T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.75928",
                    "published_at": "2026-04-01T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.75931",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.75964",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.75942",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.75975",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.7599",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.76015",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.75991",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00923",
                    "scoring_system": "epss",
                    "scoring_elements": "0.75985",
                    "published_at": "2026-04-13T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-9482"
        },
        {
            "reference_url": "https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c"
        },
        {
            "reference_url": "https://github.com/apache/nifi-registry/pull/259/commits/32f9352465e877d71ad7f85b70f2304ba620e133#diff-a72e640a2c41fe6fe8848066f6a588da2e9e76350bef287d7e145a231042c485",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/apache/nifi-registry/pull/259/commits/32f9352465e877d71ad7f85b70f2304ba620e133#diff-a72e640a2c41fe6fe8848066f6a588da2e9e76350bef287d7e145a231042c485"
        },
        {
            "reference_url": "https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd"
        },
        {
            "reference_url": "https://nifi.apache.org/registry-security.html#CVE-2020-9482",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nifi.apache.org/registry-security.html#CVE-2020-9482"
        },
        {
            "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9482",
            "reference_id": "CVE-2020-9482",
            "reference_type": "",
            "scores": [
                {
                    "value": "6.5",
                    "scoring_system": "cvssv3.1",
                    "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"
                },
                {
                    "value": "MODERATE",
                    "scoring_system": "generic_textual",
                    "scoring_elements": ""
                }
            ],
            "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9482"
        },
        {
            "reference_url": "https://github.com/advisories/GHSA-rcwj-2hj2-vmjj",
            "reference_id": "GHSA-rcwj-2hj2-vmjj",
            "reference_type": "",
            "scores": [
                {
                    "value": "MODERATE",
                    "scoring_system": "cvssv3.1_qr",
                    "scoring_elements": ""
                }
            ],
            "url": "https://github.com/advisories/GHSA-rcwj-2hj2-vmjj"
        }
    ],
    "weaknesses": [
        {
            "cwe_id": 1035,
            "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities",
            "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017."
        },
        {
            "cwe_id": 613,
            "name": "Insufficient Session Expiration",
            "description": "According to WASC, Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization."
        },
        {
            "cwe_id": 937,
            "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities",
            "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013."
        }
    ],
    "exploits": [],
    "severity_range_score": "4.0 - 6.9",
    "exploitability": "0.5",
    "weighted_severity": "6.2",
    "risk_score": 3.1,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6xux-6rk7-gygr"
}