Lookup for vulnerabilities affecting packages.

GET /api/vulnerabilities/91601?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/vulnerabilities/91601?format=api",
    "vulnerability_id": "VCID-bp2y-n3cz-x3ha",
    "summary": "The Date Library in John Lim ADOdb Library for PHP allows remote attackers to obtain sensitive information via a direct request for (1) server.php, (2) adodb-errorpear.inc.php, (3) adodb-iterator.inc.php, (4) adodb-pear.inc.php, (5) adodb-perf.inc.php, (6) adodb-xmlschema.inc.php, and (7) adodb.inc.php; files in datadict including (8) datadict-access.inc.php, (9) datadict-db2.inc.php, (10) datadict-generic.inc.php, (11) datadict-ibase.inc.php, (12) datadict-informix.inc.php, (13) datadict-mssql.inc.php, (14) datadict-mysql.inc.php, (15) datadict-oci8.inc.php, (16) datadict-postgres.inc.php, and (17) datadict-sybase.inc.php; files in drivers/ including (18) adodb-access.inc.php, (19) adodb-ado.inc.php, (20) adodb-ado_access.inc.php, (21) adodb-ado_mssql.inc.php, (22) adodb-borland_ibase.inc.php, (23) adodb-csv.inc.php, (24) adodb-db2.inc.php, (25) adodb-fbsql.inc.php, (26) adodb-firebird.inc.php, (27) adodb-ibase.inc.php, (28) adodb-informix.inc.php, (29) adodb-informix72.inc.php, (30) adodb-mssql.inc.php, (31) adodb-mssqlpo.inc.php, (32) adodb-mysql.inc.php, (33) adodb-mysqli.inc.php, (34) adodb-mysqlt.inc.php, (35) adodb-oci8.inc.php, (36) adodb-oci805.inc.php, (37) adodb-oci8po.inc.php, (38) adodb-odbc.inc.php, (39) adodb-odbc_mssql.inc.php, (40) adodb-odbc_oracle.inc.php, (41) adodb-oracle.inc.php, (42) adodb-postgres64.inc.php, (43) adodb-postgres7.inc.php, (44) adodb-proxy.inc.php, (45) adodb-sapdb.inc.php, (46) adodb-sqlanywhere.inc.php, (47) adodb-sqlite.inc.php, (48) adodb-sybase.inc.php, (49) adodb-vfp.inc.php; file in perf/ including (50) perf-db2.inc.php, (51) perf-informix.inc.php, (52) perf-mssql.inc.php, (53) perf-mysql.inc.php, (54) perf-oci8.inc.php, (55) perf-postgres.inc.php; tests/ files (56) benchmark.php, (57) client.php, (58) test-datadict.php, (59) test-perf.php, (60) test-pgblob.php, (61) test-php5.php, (62) test-xmlschema.php, (63) test.php, (64) test2.php, (65) test3.php, (66) test4.php, (67) test5.php, (68) test_rs_array.php, (69) testcache.php, (70) testdatabases.inc.php, (71) testgenid.php, (72) testmssql.php, (73) testoci8.php, (74) testoci8cursor.php, (75) testpaging.php, (76) testpear.php, (77) testsessions.php, (78) time.php, or (79) tmssql.php, which reveals the path in various error messages.",
    "aliases": [
        {
            "alias": "CVE-2006-4976"
        }
    ],
    "fixed_packages": [
        {
            "url": "http://public2.vulnerablecode.io/api/packages/935254?format=api",
            "purl": "pkg:deb/debian/phppgadmin@5.1%2Bds-1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phppgadmin@5.1%252Bds-1%3Fdistro=trixie"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/packages/935250?format=api",
            "purl": "pkg:deb/debian/phppgadmin@7.14.7%2Bdfsg-1?distro=trixie",
            "is_vulnerable": false,
            "affected_by_vulnerabilities": [],
            "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/phppgadmin@7.14.7%252Bdfsg-1%3Fdistro=trixie"
        }
    ],
    "affected_packages": [],
    "references": [
        {
            "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4976",
            "reference_id": "",
            "reference_type": "",
            "scores": [
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.64895",
                    "published_at": "2026-04-01T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.64945",
                    "published_at": "2026-04-02T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.64973",
                    "published_at": "2026-04-04T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.64936",
                    "published_at": "2026-04-07T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.64985",
                    "published_at": "2026-04-08T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65",
                    "published_at": "2026-04-09T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65018",
                    "published_at": "2026-04-11T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65007",
                    "published_at": "2026-04-12T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.64979",
                    "published_at": "2026-04-13T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65015",
                    "published_at": "2026-04-16T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65025",
                    "published_at": "2026-04-18T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65012",
                    "published_at": "2026-04-21T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65031",
                    "published_at": "2026-04-24T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65044",
                    "published_at": "2026-04-26T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65041",
                    "published_at": "2026-04-29T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65022",
                    "published_at": "2026-05-05T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.6507",
                    "published_at": "2026-05-07T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65113",
                    "published_at": "2026-05-09T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65081",
                    "published_at": "2026-05-11T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65103",
                    "published_at": "2026-05-12T12:55:00Z"
                },
                {
                    "value": "0.00478",
                    "scoring_system": "epss",
                    "scoring_elements": "0.65159",
                    "published_at": "2026-05-14T12:55:00Z"
                }
            ],
            "url": "https://api.first.org/data/v1/epss?cve=CVE-2006-4976"
        },
        {
            "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4976",
            "reference_id": "",
            "reference_type": "",
            "scores": [],
            "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4976"
        }
    ],
    "weaknesses": [],
    "exploits": [],
    "severity_range_score": null,
    "exploitability": null,
    "weighted_severity": null,
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bp2y-n3cz-x3ha"
}