Lookup for vulnerable packages by Package URL.

GET /api/packages/133381?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/133381?format=api",
    "purl": "pkg:gem/nokogiri@1.0.0",
    "type": "gem",
    "namespace": "",
    "name": "nokogiri",
    "version": "1.0.0",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "1.19.1",
    "latest_non_vulnerable_version": "1.19.1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8183?format=api",
            "vulnerability_id": "VCID-22km-jmtd-yyde",
            "summary": "Vulnerabilities in libxml2\nThe version of libxml2 packaged with Nokogiri contains several vulnerabilities. Nokogiri has mitigated these issues by upgrading to libxml It was discovered that a type confusion error existed in libxml2. An attacker could use this to specially construct XML data that could cause a denial of service or possibly execute arbitrary code. (CVE-2017-0663) It was discovered that libxml2 did not properly validate parsed entity references. An attacker could use this to specially construct XML data that could expose sensitive information. (CVE-2017-7375) It was discovered that a buffer overflow existed in libxml2 when handling HTTP redirects. An attacker could use this to specially construct XML data that could cause a denial of service or possibly execute arbitrary code. (CVE-2017-7376) Marcel Böhme and Van-Thuan Pham discovered a buffer overflow in libxml2 when handling elements. An attacker could use this to specially construct XML data that could cause a denial of service or possibly execute arbitrary code. (CVE-2017-9047) Marcel Böhme and Van-Thuan Pham discovered a buffer overread in libxml2 when handling elements. An attacker could use this to specially construct XML data that could cause a denial of service. (CVE-2017-9048) Marcel Böhme and Van-Thuan Pham discovered multiple buffer overreads in libxml2 when handling parameter-entity references. An attacker could use these to specially construct XML data that could cause a denial of service. (CVE-2017-9049, CVE-2017-9050)",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1673"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/24712?format=api",
                    "purl": "pkg:gem/nokogiri@1.8.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.8.1"
                }
            ],
            "aliases": [
                "USN-3424-1"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-22km-jmtd-yyde"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7237?format=api",
            "vulnerability_id": "VCID-2b1g-gp84-87e8",
            "summary": "Improper Restriction of Operations within the Bounds of a Memory Buffer\nHeap-based buffer overflow in the xmlGROW function in parser.c in libxml2 allows context-dependent attackers to obtain sensitive process memory information via unspecified vectors.",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=145382616617563&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://marc.info/?l=bugtraq&m=145382616617563&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2549.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2549.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7499.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7499.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81559",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81487",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81499",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81521",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81518",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81546",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81552",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01577",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81572",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-7499"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281925",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1281925"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://git.gnome.org/browse/libxml2/commit/?id=28cd9cb747a94483f4aea7f0968d202c20bb4cfc"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://git.gnome.org/browse/libxml2/commit/?id=35bcb1d758ed70aa7b257c9c3b3ff55e54e3d0da"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jxjr-5h69-qw3w",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jxjr-5h69-qw3w"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-7499.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-7499.yml"
                },
                {
                    "reference_url": "https://groups.google.com/forum/#!topic/ruby-security-ann/Dy7YiKb_pMM",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://groups.google.com/forum/#!topic/ruby-security-ann/Dy7YiKb_pMM"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172"
                },
                {
                    "reference_url": "https://support.apple.com/HT206166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206166"
                },
                {
                    "reference_url": "https://support.apple.com/HT206167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206167"
                },
                {
                    "reference_url": "https://support.apple.com/HT206168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206168"
                },
                {
                    "reference_url": "https://support.apple.com/HT206169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206169"
                },
                {
                    "reference_url": "https://web.archive.org/web/20210724022841/http://www.securityfocus.com/bid/79509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20210724022841/http://www.securityfocus.com/bid/79509"
                },
                {
                    "reference_url": "https://web.archive.org/web/20211205133229/https://securitytracker.com/id/1034243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20211205133229/https://securitytracker.com/id/1034243"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2015/dsa-3430"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79509",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79509"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034243"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2834-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2834-1"
                },
                {
                    "reference_url": "http://xmlsoft.org/news.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://xmlsoft.org/news.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7499",
                    "reference_id": "CVE-2015-7499",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7499"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-37",
                    "reference_id": "GLSA-201701-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2549",
                    "reference_id": "RHSA-2015:2549",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2549"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2550",
                    "reference_id": "RHSA-2015:2550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2550"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1089",
                    "reference_id": "RHSA-2016:1089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1089"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2834-1/",
                    "reference_id": "USN-2834-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2834-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2875-1/",
                    "reference_id": "USN-2875-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2875-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/21468?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.7.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.7.2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/133906?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.8.rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.8.rc1"
                }
            ],
            "aliases": [
                "CVE-2015-7499",
                "GHSA-jxjr-5h69-qw3w"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2b1g-gp84-87e8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7201?format=api",
            "vulnerability_id": "VCID-2dje-jsyy-cqbe",
            "summary": "Multiple vulnerabilities in libxml2, libxslt\nThe vendored libxml2 and libxslt libraries have multiple vulnerabilities: CVE-2015-1819 CVE-2015-7941_1 CVE-2015-7941_2 CVE-2015-7942 CVE-2015-7942-2 CVE-2015-8035 CVE-2015-7995",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/master/CHANGELOG.rdoc#167rc4--2015-11-22",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/master/CHANGELOG.rdoc#167rc4--2015-11-22"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/v1.6.6.x/CHANGELOG.rdoc#1663--2015-11-16",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/v1.6.6.x/CHANGELOG.rdoc#1663--2015-11-16"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/ac6106f1e641d50b27752c52b355e01d03ae8829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/ac6106f1e641d50b27752c52b355e01d03ae8829"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/ee52b7be5b47e1029af98f6b7eb6df7fc5ffd359",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/ee52b7be5b47e1029af98f6b7eb6df7fc5ffd359"
                },
                {
                    "reference_url": "https://groups.google.com/forum/#!topic/nokogiri-talk/gEpHWo2xLCE",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://groups.google.com/forum/#!topic/nokogiri-talk/gEpHWo2xLCE"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/21273?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.6.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-64ca-973e-nfgm"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-b5tz-9s1v-pkg7"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-v226-z8ay-sue4"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.6.3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/21189?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.7.rc4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-64ca-973e-nfgm"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.7.rc4"
                }
            ],
            "aliases": [
                "GMS-2015-42"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2dje-jsyy-cqbe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7361?format=api",
            "vulnerability_id": "VCID-2j62-5rjn-vyeu",
            "summary": "Uncontrolled Resource Consumption\ndict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"<!DOCTYPE html\" substring in a crafted HTML document.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8806.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8806.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9071",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90694",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90743",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90746",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90737",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90731",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9072",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90699",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8806"
                },
                {
                    "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=749115",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.gnome.org/show_bug.cgi?id=749115"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2073"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4483"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-8806.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-8806.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/03d402212707bd5dfa0a21b7de5e91a7f9d90028",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/03d402212707bd5dfa0a21b7de5e91a7f9d90028"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1473",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1473"
                },
                {
                    "reference_url": "https://mail.gnome.org/archives/xml/2016-May/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://mail.gnome.org/archives/xml/2016-May/msg00023.html"
                },
                {
                    "reference_url": "https://web.archive.org/web/20160928171015/http://www.securityfocus.com/bid/82071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20160928171015/http://www.securityfocus.com/bid/82071"
                },
                {
                    "reference_url": "https://www.debian.org/security/2016/dsa-3593",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2016/dsa-3593"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/03/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/03/5"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/82071",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/82071"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/usn-2994-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/usn-2994-1/"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2994-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2994-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304636",
                    "reference_id": "1304636",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304636"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813613",
                    "reference_id": "813613",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813613"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8806",
                    "reference_id": "CVE-2015-8806",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8806"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7hp2-xwpj-95jq",
                    "reference_id": "GHSA-7hp2-xwpj-95jq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7hp2-xwpj-95jq"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-37",
                    "reference_id": "GLSA-201701-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-37"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2994-1/",
                    "reference_id": "USN-2994-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2994-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/22197?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.8"
                }
            ],
            "aliases": [
                "CVE-2015-8806",
                "GHSA-7hp2-xwpj-95jq"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2j62-5rjn-vyeu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/15398?format=api",
            "vulnerability_id": "VCID-365e-j8ta-h7cn",
            "summary": "Nokogiri update packaged libxml2 to v2.12.5 to resolve CVE-2024-25062\n## Summary\n\nNokogiri upgrades its dependency libxml2 as follows:\n- Nokogiri v1.15.6 upgrades libxml2 to [2.11.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.11.7) from 2.11.6\n- Nokogiri v1.16.2 upgrades libxml2 to [2.12.5](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5) from 2.12.4\n\nlibxml2 v2.11.7 and v2.12.5 address the following vulnerability:\n\n- CVE-2024-25062 / https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062\n  - described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/604\n  - patched by https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements.\n\nJRuby users are not affected.\n\n## Mitigation\n\nUpgrade to Nokogiri `~> 1.15.6` or `>= 1.16.2`.\n\nUsers who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile\nand link Nokogiri against patched external libxml2 libraries which will also address these same\nissues.\n\n## Impact\n\nFrom the CVE description, this issue applies to the `xmlTextReader` module (which underlies `Nokogiri::XML::Reader`):\n\n> When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.\n\n## Timeline\n\n- 2024-02-04 10:35 EST - this GHSA is drafted without complete details about when the upstream issue was introduced; a request is made of libxml2 maintainers for more detailed information\n- 2024-02-04 10:48 EST - updated GHSA to reflect libxml2 maintainers' confirmation of affected versions\n- 2024-02-04 11:54 EST - v1.16.2 published, this GHSA made public\n- 2024-02-05 10:18 EST - updated with MITRE link to the CVE information, and updated \"Impact\" section\n- 2024-03-16 09:03 EDT - v1.15.6 published (see discussion at https://github.com/sparklemotion/nokogiri/discussions/3146) updated mitigation information\n- 2024-03-18 22:12 EDT - update \"affected products\" range with v1.15.6 information",
            "references": [
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-xc9x-jj77-9p9j.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-xc9x-jj77-9p9j.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/discussions/3146",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/discussions/3146"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xc9x-jj77-9p9j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xc9x-jj77-9p9j"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/604"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.5"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-25062"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-xc9x-jj77-9p9j",
                    "reference_id": "GHSA-xc9x-jj77-9p9j",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-xc9x-jj77-9p9j"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54411?format=api",
                    "purl": "pkg:gem/nokogiri@1.15.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.15.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/139118?format=api",
                    "purl": "pkg:gem/nokogiri@1.16.0.rc1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.16.0.rc1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54407?format=api",
                    "purl": "pkg:gem/nokogiri@1.16.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.16.2"
                }
            ],
            "aliases": [
                "GHSA-xc9x-jj77-9p9j",
                "GMS-2024-127"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-365e-j8ta-h7cn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7898?format=api",
            "vulnerability_id": "VCID-3f2w-tgya-x3cc",
            "summary": "Upstream libxslt vulnerabilities\nThe `xsltAddTextString` function in `transform.c` in libxslt, as used by nokogiri, lacks a check for integer overflow during a size calculation, which allows a remote attacker to perform an out-of-bounds memory write via a crafted HTML page.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0499.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2017-0499.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5029.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5029.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79182",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79141",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79165",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79173",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01232",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79197",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79409",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79438",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01266",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79416",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-5029"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/676623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/676623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5029"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5030",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5030"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5031",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5031"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5032"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5033",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5033"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5034",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5034"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5037",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5037"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5038",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5038"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5040",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5040"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5041"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5042",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5042"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5043",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5043"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5044",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5044"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5045",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5045"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5046",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5046"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-pf6m-fxpq-fg8v",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-pf6m-fxpq-fg8v"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-5029.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-5029.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1634",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1634"
                },
                {
                    "reference_url": "https://ubuntu.com/security/CVE-2017-5029",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://ubuntu.com/security/CVE-2017-5029"
                },
                {
                    "reference_url": "https://ubuntu.com/security/notices/USN-3271-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://ubuntu.com/security/notices/USN-3271-1"
                },
                {
                    "reference_url": "http://www.debian.org/security/2017/dsa-3810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2017/dsa-3810"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/96767",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/96767"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1038157",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1038157"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1431033",
                    "reference_id": "1431033",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1431033"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546",
                    "reference_id": "858546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201703-4",
                    "reference_id": "ASA-201703-4",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201703-4"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201703-5",
                    "reference_id": "ASA-201703-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201703-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-195",
                    "reference_id": "AVG-195",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-195"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-196",
                    "reference_id": "AVG-196",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-196"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-197",
                    "reference_id": "AVG-197",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-197"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:1.1.29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxslt:1.1.29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:1.1.29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5029",
                    "reference_id": "CVE-2017-5029",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-5029"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-01",
                    "reference_id": "GLSA-201804-01",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-01"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:0499",
                    "reference_id": "RHSA-2017:0499",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2017:0499"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3236-1/",
                    "reference_id": "USN-3236-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3236-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3271-1/",
                    "reference_id": "USN-3271-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3271-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/23172?format=api",
                    "purl": "pkg:gem/nokogiri@1.7.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.7.1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/78741?format=api",
                    "purl": "pkg:gem/nokogiri@1.7.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.7.2"
                }
            ],
            "aliases": [
                "CVE-2017-5029",
                "GHSA-pf6m-fxpq-fg8v"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3f2w-tgya-x3cc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6932?format=api",
            "vulnerability_id": "VCID-3n8z-mqjc-6fh9",
            "summary": "XML Document Root Element Handling Memory Consumption Remote DoS\nThis package contains a flaw that is triggered when handling a root element in an XML document. This may allow a remote attacker to cause a consumption of memory resources.",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/pull/1087",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/pull/1087"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/20651?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2dje-jsyy-cqbe"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-64ca-973e-nfgm"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-b5tz-9s1v-pkg7"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-v226-z8ay-sue4"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.3"
                }
            ],
            "aliases": [
                "OSVDB-118481"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3n8z-mqjc-6fh9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51925?format=api",
            "vulnerability_id": "VCID-43qu-922g-myca",
            "summary": "Update bundled libxml2 to v2.10.3 to resolve multiple CVEs\n### Summary\n\nNokogiri v1.13.9 upgrades the packaged version of its dependency libxml2 to [v2.10.3](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.3) from v2.9.14.\n\nlibxml2 v2.10.3 addresses the following known vulnerabilities:\n\n- [CVE-2022-2309](https://nvd.nist.gov/vuln/detail/CVE-2022-2309)\n- [CVE-2022-40304](https://nvd.nist.gov/vuln/detail/CVE-2022-40304)\n- [CVE-2022-40303](https://nvd.nist.gov/vuln/detail/CVE-2022-40303)\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.9`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements.\n\n\n### Mitigation\n\nUpgrade to Nokogiri `>= 1.13.9`.\n\nUsers who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link Nokogiri against external libraries libxml2 `>= 2.10.3` which will also address these same issues.\n\n\n### Impact\n\n#### libxml2 [CVE-2022-2309](https://nvd.nist.gov/vuln/detail/CVE-2022-2309)\n\n- **CVSS3 score**: Under evaluation\n- **Type**: Denial of service\n- **Description**: NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.\n\nNokogiri maintainers investigated at #2620 and determined this CVE does not affect Nokogiri users.\n\n\n#### libxml2 [CVE-2022-40304](https://nvd.nist.gov/vuln/detail/CVE-2022-40304)\n\n- **CVSS3 score**: Unspecified upstream\n- **Type**: Data corruption, denial of service\n- **Description**: When an entity reference cycle is detected, the entity content is cleared by setting its first byte to zero. But the entity content might be allocated from a dict. In this case, the dict entry becomes corrupted leading to all kinds of logic errors, including memory errors like double-frees.\n\nSee https://gitlab.gnome.org/GNOME/libxml2/-/commit/644a89e080bced793295f61f18aac8cfad6bece2\n\n\n#### libxml2 [CVE-2022-40303](https://nvd.nist.gov/vuln/detail/CVE-2022-40303)\n\n- **CVSS3 score**: Unspecified upstream\n- **Type**: Integer overflow\n- **Description**: Integer overflows with XML_PARSE_HUGE\n\nSee https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0\n\n\n### References\n\n- [libxml2 release notes](https://gitlab.gnome.org/GNOME/libxml2/-/releases)\n- [CVE-2022-2309](https://nvd.nist.gov/vuln/detail/CVE-2022-2309)\n- [CVE-2022-40304](https://nvd.nist.gov/vuln/detail/CVE-2022-40304)\n- [CVE-2022-40303](https://nvd.nist.gov/vuln/detail/CVE-2022-40303)",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2qc6-mcvw-92cw",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2qc6-mcvw-92cw"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-2qc6-mcvw-92cw",
                    "reference_id": "GHSA-2qc6-mcvw-92cw",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-2qc6-mcvw-92cw"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79742?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.9",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eru7-uy2t-d3ef"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.9"
                }
            ],
            "aliases": [
                "GHSA-2qc6-mcvw-92cw",
                "GMS-2022-5550"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-43qu-922g-myca"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7413?format=api",
            "vulnerability_id": "VCID-5uqv-dm9p-c7c6",
            "summary": "Improper Restriction of Operations within the Bounds of a Memory Buffer\nnokogiri mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.",
            "references": [
                {
                    "reference_url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00001.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00002.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00003.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Jul/msg00005.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00062.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00063.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00005.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1683.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1683.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76859",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76865",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76801",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76805",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76834",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76815",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76846",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76857",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76885",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1683"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340016",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1340016"
                },
                {
                    "reference_url": "https://crbug.com/583156",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://crbug.com/583156"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7995"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10403"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1667"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1668"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1669"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1670"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1672"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1673"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1674"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1675"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1676"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1677"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1678"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1679"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1680"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1681"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1682"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1683"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1684"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1685"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1686"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1687"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1688"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1689"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1690"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1691"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1692"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1693"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1694"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1695"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/libxslt/commit/?id=d182d8f6ba3071503d96ce17395c9d55871f0242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.gnome.org/browse/libxslt/commit/?id=d182d8f6ba3071503d96ce17395c9d55871f0242"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/"
                },
                {
                    "reference_url": "https://support.apple.com/HT206899",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206899"
                },
                {
                    "reference_url": "https://support.apple.com/HT206901",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206901"
                },
                {
                    "reference_url": "https://support.apple.com/HT206902",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206902"
                },
                {
                    "reference_url": "https://support.apple.com/HT206903",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206903"
                },
                {
                    "reference_url": "https://support.apple.com/HT206904",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206904"
                },
                {
                    "reference_url": "https://support.apple.com/HT206905",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://support.apple.com/HT206905"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3590"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3605"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/90876",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/90876"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/91826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/91826"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1035981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1035981"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2992-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2992-1"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1683",
                    "reference_id": "CVE-2016-1683",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1683"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201607-07",
                    "reference_id": "GLSA-201607-07",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201607-07"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1190",
                    "reference_id": "RHSA-2016:1190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1190"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2992-1/",
                    "reference_id": "USN-2992-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2992-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3271-1/",
                    "reference_id": "USN-3271-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3271-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/22465?format=api",
                    "purl": "pkg:gem/nokogiri@1.2.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2dje-jsyy-cqbe"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-3n8z-mqjc-6fh9"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-b5tz-9s1v-pkg7"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-v226-z8ay-sue4"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zrsc-vqxk-vkgx"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.2.0"
                }
            ],
            "aliases": [
                "CVE-2016-1683"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5uqv-dm9p-c7c6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31756?format=api",
            "vulnerability_id": "VCID-64c1-dzhs-u3gj",
            "summary": "Nokogiri has a vulnerability allowing arbitrary execution of code\n    if a certain function is used.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90714",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90763",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90765",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90758",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90751",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90741",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9073",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9072",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5477"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5477"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5477.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5477.yml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexical/CVE-2019-5477.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexical/CVE-2019-5477.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/5d30128343573a9428c86efc758ba2c66e9f12dc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/5d30128343573a9428c86efc758ba2c66e9f12dc"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1915"
                },
                {
                    "reference_url": "https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/tenderlove/rexical/blob/master/CHANGELOG.rdoc"
                },
                {
                    "reference_url": "https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/tenderlove/rexical/commit/a652474dbc66be350055db3e8f9b3a7b3fd75926"
                },
                {
                    "reference_url": "https://hackerone.com/reports/650835",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://hackerone.com/reports/650835"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00019.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00019.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5477",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5477"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4175-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4175-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4175-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4175-1/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934802",
                    "reference_id": "934802",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934802"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940905",
                    "reference_id": "940905",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=940905"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-cr5j-953j-xw5p",
                    "reference_id": "GHSA-cr5j-953j-xw5p",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-cr5j-953j-xw5p"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202006-05",
                    "reference_id": "GLSA-202006-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202006-05"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/35955?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.4"
                }
            ],
            "aliases": [
                "CVE-2019-5477",
                "GHSA-cr5j-953j-xw5p"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64c1-dzhs-u3gj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29798?format=api",
            "vulnerability_id": "VCID-6r5w-pgkx-v3cb",
            "summary": "Nokogiri patches vendored libxml2 to resolve multiple CVEs\n## Summary\n\nNokogiri v1.18.9 patches the vendored libxml2 to address CVE-2025-6021, CVE-2025-6170, CVE-2025-49794, CVE-2025-49795, and CVE-2025-49796.\n\n## Impact and severity\n\n### CVE-2025-6021\n\nA flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.\n\nNVD claims a severity of 7.5 High (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\nFixed by applying https://gitlab.gnome.org/GNOME/libxml2/-/commit/17d950ae\n\n### CVE-2025-6170\n\nA flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.\n\nNVD claims a severity of 2.5 Low (CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L)\n\nFixed by applying https://gitlab.gnome.org/GNOME/libxml2/-/commit/5e9ec5c1\n\n### CVE-2025-49794\n\nA use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path=\"...\"/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.\n\nNVD claims a severity of 9.1 Critical (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H)\n\nFixed by applying https://gitlab.gnome.org/GNOME/libxml2/-/commit/81cef8c5\n\n### CVE-2025-49795\n\nA NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.\n\nNVD claims a severity of 7.5 High (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)\n\nFixed by applying https://gitlab.gnome.org/GNOME/libxml2/-/commit/62048278\n\n### CVE-2025-49796\n\nA vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.\n\nNVD claims a severity of 9.1 Critical (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H)\n\nFixed by applying https://gitlab.gnome.org/GNOME/libxml2/-/commit/81cef8c5\n\n## Affected Versions\n\n- Nokogiri < 1.18.9 when using CRuby (MRI) with vendored libxml2\n\n## Patched Versions\n\n- Nokogiri >= 1.18.9\n\n## Mitigation\n\nUpgrade to Nokogiri v1.18.9 or later.\n\nUsers who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link Nokogiri against patched external libxml2 libraries which will also address these same issues.\n\n## References\n\n- https://github.com/sparklemotion/nokogiri/pull/3526\n- https://nvd.nist.gov/vuln/detail/CVE-2025-6021\n- https://nvd.nist.gov/vuln/detail/CVE-2025-6170\n- https://nvd.nist.gov/vuln/detail/CVE-2025-49794\n- https://nvd.nist.gov/vuln/detail/CVE-2025-49795\n- https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/pull/3526",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/pull/3526"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-353f-x4gh-cqq8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-353f-x4gh-cqq8"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6170",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6170"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-353f-x4gh-cqq8",
                    "reference_id": "GHSA-353f-x4gh-cqq8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-353f-x4gh-cqq8"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/70555?format=api",
                    "purl": "pkg:gem/nokogiri@1.18.9",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.18.9"
                }
            ],
            "aliases": [
                "GHSA-353f-x4gh-cqq8"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6r5w-pgkx-v3cb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44699?format=api",
            "vulnerability_id": "VCID-7bpp-2hvk-2udv",
            "summary": "Multiple vulnerabilities have been found in libxml2, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00036.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00061.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24977.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24977.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-24977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66024",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65987",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66036",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66048",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66067",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00502",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66054",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66619",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66645",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00516",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6658",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-24977"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24977"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/178",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/178"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772@%3Cdev.mina.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2NQ5GTDYOVH26PBCPYXXMGW5ZZXWMGZC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5KTUAGDLEHTH6HU66HBFAFTSQ3OKRAN3/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/674LQPJO2P2XTBTREFR5LOZMBTZ4PZAY/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7KQXOHIE3MNY3VQXEN7LDQUJNIHOVHAW/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ENEHQIBMSI6TZVS35Y6I4FCTYUQDLJVP/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H3IQ7OQXBKWD3YP7HO6KCNOMLE5ZO2IR/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/J3ICASXZI2UQYFJAOQWHSTNWGED3VXOE/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JCHXIWR5DHYO3RSO7RAHEC6VJKXD2EH2/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O7MEWYKIKMV2SKMGH4IDWVU3ZGJXBCPQ/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RIQAMBA2IJUTQG5VOP5LZVIZRNCKXHEQ/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200924-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20200924-0001/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877788",
                    "reference_id": "1877788",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877788"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969529",
                    "reference_id": "969529",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969529"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-15",
                    "reference_id": "ASA-202011-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1263",
                    "reference_id": "AVG-1263",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1263"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24977",
                    "reference_id": "CVE-2020-24977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-24977"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-05",
                    "reference_id": "GLSA-202107-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1597",
                    "reference_id": "RHSA-2021:1597",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1597"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4991-1/",
                    "reference_id": "USN-4991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37340?format=api",
                    "purl": "pkg:gem/nokogiri@1.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.11.4"
                }
            ],
            "aliases": [
                "CVE-2020-24977"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bpp-2hvk-2udv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11286?format=api",
            "vulnerability_id": "VCID-8geh-vfns-pfgs",
            "summary": "Improper Restriction of XML External Entity Reference\nNokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41098.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-41098.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-41098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68411",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68444",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68456",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6843",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68413",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00564",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68362",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00565",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68359",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00565",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68379",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00565",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68398",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-41098"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-41098.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-41098.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008914",
                    "reference_id": "2008914",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2008914"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2424",
                    "reference_id": "AVG-2424",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2424"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41098",
                    "reference_id": "CVE-2021-41098",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41098"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-2rr5-8q37-2w7h",
                    "reference_id": "GHSA-2rr5-8q37-2w7h",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-2rr5-8q37-2w7h"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/39961?format=api",
                    "purl": "pkg:gem/nokogiri@1.12.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.12.5"
                }
            ],
            "aliases": [
                "CVE-2021-41098",
                "GHSA-2rr5-8q37-2w7h"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8geh-vfns-pfgs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10824?format=api",
            "vulnerability_id": "VCID-96v6-vs1m-skf3",
            "summary": "Improper Input Validation\nIn `numbers.c` in libxslt, which is used by nokogiri, a type holding grouping characters of an `xsl:number` instruction was too narrow and an invalid character/length combination could be passed to `xsltNumberFormatDecimal`, leading to a read of uninitialized stack data.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13118.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13118.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-13118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77289",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77313",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77263",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77245",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77276",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77285",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77292",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77228",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01027",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77235",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-13118"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15069",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15069"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13118"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Aug/11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Aug/13",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Aug/14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Aug/15",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Jul/22",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Jul/22"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Jul/23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Jul/23"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Jul/24",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Jul/24"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Jul/26",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Jul/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Jul/31",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Jul/31"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Jul/37",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Jul/37"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2019/Jul/38",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2019/Jul/38"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/f7aa3b0b29d6fe5fafe93dacd9b96b6b3d16b7ec/CHANGELOG.md?plain=1#L796",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/f7aa3b0b29d6fe5fafe93dacd9b96b6b3d16b7ec/CHANGELOG.md?plain=1#L796"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/43a175339b47b8c604508813fc75b83f13cd173e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/43a175339b47b8c604508813fc75b83f13cd173e"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1943"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.10.5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.10.5"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxslt/commit/6ce8de69330783977dd14f6569419489875fb71b"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/"
                },
                {
                    "reference_url": "https://oss-fuzz.com/testcase-detail/5197371471822848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://oss-fuzz.com/testcase-detail/5197371471822848"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Aug/21",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Aug/21"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Aug/22",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Aug/22"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Aug/23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Aug/23"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Aug/25",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Aug/25"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jul/35",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jul/35"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jul/36",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jul/36"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jul/37",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jul/37"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jul/40",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jul/40"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jul/41",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jul/41"
                },
                {
                    "reference_url": "https://seclists.org/bugtraq/2019/Jul/42",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://seclists.org/bugtraq/2019/Jul/42"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190806-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190806-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190806-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190806-0004/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200122-0003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200122-0003"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200122-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20200122-0003/"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT210346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT210346"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT210348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT210348"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT210351",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT210351"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT210353",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT210353"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT210356",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT210356"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT210357",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT210357"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT210358",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT210358"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4164-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4164-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2020.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/11/17/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2019/11/17/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728541",
                    "reference_id": "1728541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728541"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931320",
                    "reference_id": "931320",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931320"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13118",
                    "reference_id": "CVE-2019-13118",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13118"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-cf46-6xxh-pc75",
                    "reference_id": "GHSA-cf46-6xxh-pc75",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-cf46-6xxh-pc75"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4164-1/",
                    "reference_id": "USN-4164-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4164-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37248?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.5"
                }
            ],
            "aliases": [
                "CVE-2019-13118",
                "GHSA-cf46-6xxh-pc75"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-96v6-vs1m-skf3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44704?format=api",
            "vulnerability_id": "VCID-9hqf-12yh-bkc8",
            "summary": "Multiple vulnerabilities have been found in libxml2, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3518.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48398",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48386",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48412",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48388",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48394",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0025",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48339",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49056",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.49118",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00257",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4909",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3518"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954242"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3518"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Jul/54",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Jul/54"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Jul/55",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Jul/55"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Jul/58",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Jul/58"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2021/Jul/59",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2021/Jul/59"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3518.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3518.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/2edbbef95f1dc12c1ddc5ebda71b9159026245fe/CHANGELOG.md?plain=1#L722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/2edbbef95f1dc12c1ddc5ebda71b9159026245fe/CHANGELOG.md?plain=1#L722"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/"
                },
                {
                    "reference_url": "https://nokogiri.org/CHANGELOG.html#1114-2021-05-14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nokogiri.org/CHANGELOG.html#1114-2021-05-14"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3518"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210625-0002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210625-0002"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210625-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20210625-0002/"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212601",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212601"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212602",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212602"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212604",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212604"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT212605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT212605"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987737",
                    "reference_id": "987737",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987737"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1883",
                    "reference_id": "AVG-1883",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1883"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-v4f8-2847-rwm7",
                    "reference_id": "GHSA-v4f8-2847-rwm7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-v4f8-2847-rwm7"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-05",
                    "reference_id": "GLSA-202107-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202107-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2569",
                    "reference_id": "RHSA-2021:2569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1389",
                    "reference_id": "RHSA-2022:1389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1390",
                    "reference_id": "RHSA-2022:1390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1390"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4991-1/",
                    "reference_id": "USN-4991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37340?format=api",
                    "purl": "pkg:gem/nokogiri@1.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.11.4"
                }
            ],
            "aliases": [
                "CVE-2021-3518",
                "GHSA-v4f8-2847-rwm7"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9hqf-12yh-bkc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7243?format=api",
            "vulnerability_id": "VCID-9p2f-ynzb-r3gj",
            "summary": "Vulnerabilities in libxml2\nSeveral vulnerabilities were discovered in the libxml2 library that this package gem depends on.",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=145382616617563&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://marc.info/?l=bugtraq&m=145382616617563&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2549.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2549.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-1089.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5312.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5312.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76575",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76518",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76523",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76552",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76534",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76566",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76577",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76603",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76582",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5312"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276693"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://git.gnome.org/browse/libxml2/commit/?id=69030714cde66d525a8884bda01b9e8f0abf8e1e"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-5312.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-5312.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/4205af1a2a546f79d1b48df2ad8b27299c0099c5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/4205af1a2a546f79d1b48df2ad8b27299c0099c5"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/pull/1378",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/pull/1378"
                },
                {
                    "reference_url": "https://groups.google.com/forum/#!topic/ruby-security-ann/aSbgDiwb24s",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://groups.google.com/forum/#!topic/ruby-security-ann/aSbgDiwb24s"
                },
                {
                    "reference_url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04944172"
                },
                {
                    "reference_url": "https://support.apple.com/HT206166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT206166"
                },
                {
                    "reference_url": "https://support.apple.com/HT206167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT206167"
                },
                {
                    "reference_url": "https://support.apple.com/HT206168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT206168"
                },
                {
                    "reference_url": "https://support.apple.com/HT206169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT206169"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2015/dsa-3430"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/79536",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/79536"
                },
                {
                    "reference_url": "http://www.securitytracker.com/id/1034243",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securitytracker.com/id/1034243"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2834-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2834-1"
                },
                {
                    "reference_url": "http://xmlsoft.org/news.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://xmlsoft.org/news.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_federation_agent:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_file_manager:3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5312",
                    "reference_id": "CVE-2015-5312",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5312"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-xjqg-9jvg-fgx2",
                    "reference_id": "GHSA-xjqg-9jvg-fgx2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-xjqg-9jvg-fgx2"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-37",
                    "reference_id": "GLSA-201701-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2549",
                    "reference_id": "RHSA-2015:2549",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2549"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2550",
                    "reference_id": "RHSA-2015:2550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2550"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:1089",
                    "reference_id": "RHSA-2016:1089",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:1089"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2834-1/",
                    "reference_id": "USN-2834-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2834-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/21465?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.7.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.7.1"
                }
            ],
            "aliases": [
                "CVE-2015-5312",
                "GHSA-xjqg-9jvg-fgx2"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9p2f-ynzb-r3gj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13709?format=api",
            "vulnerability_id": "VCID-9wgc-swf9-z7hq",
            "summary": "Inefficient Regular Expression Complexity\nNokogiri is an open source XML and HTML library for Ruby. Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri `>= 1.13.4`. There are no known workarounds for this issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24836.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-24836.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24836",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8001",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80018",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80035",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80015",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.79978",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80006",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80208",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01377",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80228",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-24836"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24836",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24836"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/23"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2022-24836.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2022-24836.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4"
                },
                {
                    "reference_url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00013.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DHCOWMA5PQTIQIMDENA7R2Y5BDYAIYM",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DHCOWMA5PQTIQIMDENA7R2Y5BDYAIYM"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DHCOWMA5PQTIQIMDENA7R2Y5BDYAIYM/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DHCOWMA5PQTIQIMDENA7R2Y5BDYAIYM/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUPLBUZVM4WPFSXBEP2JS3R6LMKRTLFC",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUPLBUZVM4WPFSXBEP2JS3R6LMKRTLFC"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUPLBUZVM4WPFSXBEP2JS3R6LMKRTLFC/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OUPLBUZVM4WPFSXBEP2JS3R6LMKRTLFC/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDCWRQXJQ3TFSETPCEFMQ6RR6ME5UA3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDCWRQXJQ3TFSETPCEFMQ6RR6ME5UA3"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDCWRQXJQ3TFSETPCEFMQ6RR6ME5UA3/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMDCWRQXJQ3TFSETPCEFMQ6RR6ME5UA3/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-29",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202208-29"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213532"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009787",
                    "reference_id": "1009787",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1009787"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074346",
                    "reference_id": "2074346",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2074346"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24836",
                    "reference_id": "CVE-2022-24836",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24836"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-crjr-9rc5-ghw8",
                    "reference_id": "GHSA-crjr-9rc5-ghw8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-crjr-9rc5-ghw8"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8",
                    "reference_id": "GHSA-crjr-9rc5-ghw8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8506",
                    "reference_id": "RHSA-2022:8506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8506"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48280?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.4"
                }
            ],
            "aliases": [
                "CVE-2022-24836",
                "GHSA-crjr-9rc5-ghw8"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9wgc-swf9-z7hq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8546?format=api",
            "vulnerability_id": "VCID-azzy-m5pc-qudn",
            "summary": "Loop with Unreachable Exit Condition ('Infinite Loop')\nparser.c in libxml2 does not prevent infinite recursion in parameter entities.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16932.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-16932.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16932",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95738",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95772",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95773",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95769",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95766",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95757",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95755",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95774",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.21989",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95747",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16932"
                },
                {
                    "reference_url": "https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://blog.clamav.net/2018/07/clamav-01001-has-been-released.html"
                },
                {
                    "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=759579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://bugzilla.gnome.org/show_bug.cgi?id=759579"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16932"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://github.com/GNOME/libxml2/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-16932.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-16932.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1714"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/899a5d9f0ed13b8e32449a08a361e0de127dd961"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00041.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3739-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3739-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3739-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3739-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/usn/usn-3504-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/usn/usn-3504-1/"
                },
                {
                    "reference_url": "http://xmlsoft.org/news.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-04T13:30:08Z/"
                        }
                    ],
                    "url": "http://xmlsoft.org/news.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517316",
                    "reference_id": "1517316",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1517316"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882613",
                    "reference_id": "882613",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882613"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932",
                    "reference_id": "CVE-2017-16932",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16932"
                },
                {
                    "reference_url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html",
                    "reference_id": "CVE-2017-16932.HTML",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-16932.html"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-x2fm-93ww-ggvx",
                    "reference_id": "GHSA-x2fm-93ww-ggvx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-x2fm-93ww-ggvx"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3504-1/",
                    "reference_id": "USN-3504-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3504-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3504-2/",
                    "reference_id": "USN-3504-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3504-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/24712?format=api",
                    "purl": "pkg:gem/nokogiri@1.8.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.8.1"
                }
            ],
            "aliases": [
                "CVE-2017-16932",
                "GHSA-x2fm-93ww-ggvx"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-azzy-m5pc-qudn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7150?format=api",
            "vulnerability_id": "VCID-b5tz-9s1v-pkg7",
            "summary": "Vulnerabilities in libxml2 and libxslt\nSeveral vulnerabilities were discovered in the libxml2 and libxslt libraries that this package gem depends on.",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00000.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00001.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00002.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Mar/msg00004.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172710.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/172943.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00120.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-01/msg00031.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-1419.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-1419.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-2550.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1819.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-1819.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83441",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83402",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83426",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83437",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83451",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01944",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83445",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83606",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01997",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83579",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1819"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8710"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://git.gnome.org/browse/libxml2/commit/?id=213f1fe0d76d30eaed6e5853057defc43e6df2c9"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-1819.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2015-1819.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/8f3de6d88d0da11fb62a45daa61b85ce71b4af59",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/8f3de6d88d0da11fb62a45daa61b85ce71b4af59"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1374",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1374"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/pull/1376",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/pull/1376"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-1819"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201507-08",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201507-08"
                },
                {
                    "reference_url": "https://support.apple.com/HT206166",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT206166"
                },
                {
                    "reference_url": "https://support.apple.com/HT206167",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT206167"
                },
                {
                    "reference_url": "https://support.apple.com/HT206168",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT206168"
                },
                {
                    "reference_url": "https://support.apple.com/HT206169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT206169"
                },
                {
                    "reference_url": "http://www.debian.org/security/2015/dsa-3430",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2015/dsa-3430"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2812-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2812-1"
                },
                {
                    "reference_url": "http://xmlsoft.org/news.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://xmlsoft.org/news.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211278",
                    "reference_id": "1211278",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1211278"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782782",
                    "reference_id": "782782",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782782"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-q7wx-62r7-j2x7",
                    "reference_id": "GHSA-q7wx-62r7-j2x7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-q7wx-62r7-j2x7"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-37",
                    "reference_id": "GLSA-201701-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:1419",
                    "reference_id": "RHSA-2015:1419",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:1419"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:2550",
                    "reference_id": "RHSA-2015:2550",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:2550"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2812-1/",
                    "reference_id": "USN-2812-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2812-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/21188?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.6.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-64ca-973e-nfgm"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.6.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/21189?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.7.rc4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-64ca-973e-nfgm"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.7.rc4"
                }
            ],
            "aliases": [
                "CVE-2015-1819",
                "GHSA-q7wx-62r7-j2x7"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b5tz-9s1v-pkg7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9630?format=api",
            "vulnerability_id": "VCID-bejh-22y7-kuh6",
            "summary": "NULL Pointer Dereference\nA NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1543",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1543"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14404.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-14404.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14404",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.18492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95218",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.18492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95206",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.18492",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9522",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95464",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95468",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95469",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.20012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95454",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20012",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95461",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-14404"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=901817"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595985",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1595985"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1785",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1785"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/issues/10",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/issues/10"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190719-0002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190719-0002"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190719-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190719-0002/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3739-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3739-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3739-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3739-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3739-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3739-2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14404",
                    "reference_id": "CVE-2018-14404",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-14404"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-14404.yml",
                    "reference_id": "CVE-2018-14404.YML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-14404.yml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-6qvp-r6r3-9p7h",
                    "reference_id": "GHSA-6qvp-r6r3-9p7h",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-6qvp-r6r3-9p7h"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1190",
                    "reference_id": "RHSA-2020:1190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1190"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1827",
                    "reference_id": "RHSA-2020:1827",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1827"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3739-2/",
                    "reference_id": "USN-3739-2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T21:07:49Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3739-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/34629?format=api",
                    "purl": "pkg:gem/nokogiri@1.8.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.8.5"
                }
            ],
            "aliases": [
                "CVE-2018-14404",
                "GHSA-6qvp-r6r3-9p7h"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bejh-22y7-kuh6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19462?format=api",
            "vulnerability_id": "VCID-c6hb-sbhx-zqac",
            "summary": "Duplicate Advisory: Nokogiri updates packaged libxml2 to v2.12.7 to resolve CVE-2024-34459\n## Duplicate Advisory\n\nThis advisory has been withdrawn because it is a duplicate of GHSA-r95h-9x8f-r3f7. This link is maintained to preserve external references.\n\n## Original Description\n\n## Summary\n\nNokogiri v1.16.5 upgrades its dependency libxml2 to\n[2.12.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7) from 2.12.6.\n\nlibxml2 v2.12.7 addresses CVE-2024-34459:\n\n- described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/720\n- patched by https://gitlab.gnome.org/GNOME/libxml2/-/commit/2876ac53\n\n## Impact\n\nThere is no impact to Nokogiri users because the issue is present only\nin libxml2's `xmllint` tool which Nokogiri does not provide or expose.\n\n## Timeline\n\n- 2024-05-13 05:57 EDT, libxml2 2.12.7 release is announced\n- 2024-05-13 08:30 EDT, nokogiri maintainers begin triage\n- 2024-05-13 10:05 EDT, nokogiri [v1.16.5 is released](https://github.com/sparklemotion/nokogiri/releases/tag/v1.16.5)\n  and this GHSA made public",
            "references": [
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-r95h-9x8f-r3f7.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-r95h-9x8f-r3f7.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-r95h-9x8f-r3f7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-r95h-9x8f-r3f7"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/720"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r3w4-36x6-7r99",
                    "reference_id": "GHSA-r3w4-36x6-7r99",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r3w4-36x6-7r99"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/60556?format=api",
                    "purl": "pkg:gem/nokogiri@1.16.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.16.5"
                }
            ],
            "aliases": [
                "GHSA-r3w4-36x6-7r99"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c6hb-sbhx-zqac"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13082?format=api",
            "vulnerability_id": "VCID-cbm2-cez4-bqgh",
            "summary": "Use After Free\n`valid.c` in libxml2 before 2.9.13 has a use-after-free of `ID` and `IDREF` attributes.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23308.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-23308.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15524",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15601",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15656",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15623",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15588",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0005",
                            "scoring_system": "epss",
                            "scoring_elements": "0.15515",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16267",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00052",
                            "scoring_system": "epss",
                            "scoring_elements": "0.16327",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-23308"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23308"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/GNOME/libxml2/commit/652dd12a858989b14eed4e84e453059cd3ba340e"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/blob/v2.9.13/NEWS"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006489",
                    "reference_id": "1006489",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1006489"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913",
                    "reference_id": "2056913",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056913"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2726",
                    "reference_id": "AVG-2726",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2726"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308",
                    "reference_id": "CVE-2022-23308",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23308"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-03",
                    "reference_id": "GLSA-202210-03",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0899",
                    "reference_id": "RHSA-2022:0899",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0899"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1389",
                    "reference_id": "RHSA-2022:1389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1390",
                    "reference_id": "RHSA-2022:1390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1390"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5324-1/",
                    "reference_id": "USN-5324-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5324-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5422-1/",
                    "reference_id": "USN-5422-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5422-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/46643?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.2"
                }
            ],
            "aliases": [
                "CVE-2022-23308"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbm2-cez4-bqgh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57379?format=api",
            "vulnerability_id": "VCID-eb6k-ppfd-m7a3",
            "summary": "Multiple vulnerabilities have been found in libxml2, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40304.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40304.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00161",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37101",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4453",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44548",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44487",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44537",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44542",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44559",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00219",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44529",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40304"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3"
                },
                {
                    "reference_url": "https://nokogiri.org/CHANGELOG.html#1139-2022-10-18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nokogiri.org/CHANGELOG.html#1139-2022-10-18"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022225",
                    "reference_id": "1022225",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022225"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/21",
                    "reference_id": "21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136288",
                    "reference_id": "2136288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136288"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/24",
                    "reference_id": "24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/24"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/25",
                    "reference_id": "25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/25"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40304",
                    "reference_id": "CVE-2022-40304",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40304"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-39",
                    "reference_id": "GLSA-202210-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-39"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213531",
                    "reference_id": "HT213531",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213531"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213533",
                    "reference_id": "HT213533",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213533"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213534",
                    "reference_id": "HT213534",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213534"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213536"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221209-0003/",
                    "reference_id": "ntap-20221209-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221209-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0173",
                    "reference_id": "RHSA-2023:0173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0173"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0338",
                    "reference_id": "RHSA-2023:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0413",
                    "reference_id": "RHSA-2024:0413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0413"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/tags",
                    "reference_id": "tags",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-28T19:47:33Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/tags"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5760-1/",
                    "reference_id": "USN-5760-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5760-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5760-2/",
                    "reference_id": "USN-5760-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5760-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79742?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.9",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eru7-uy2t-d3ef"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.9"
                }
            ],
            "aliases": [
                "CVE-2022-40304"
            ],
            "risk_score": 3.5,
            "exploitability": "0.5",
            "weighted_severity": "7.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eb6k-ppfd-m7a3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7510?format=api",
            "vulnerability_id": "VCID-ecde-c15q-ukh1",
            "summary": "Improper Restriction of Operations within the Bounds of a Memory Buffer\nxpointer.c in libxml2 (as used in Apple iOS, OS X, tvOS, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00006.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00008.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00010.html"
                },
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2016/Sep/msg00011.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4658.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4658.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.17714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95117",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.17714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95096",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.17714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95103",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.17714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95107",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.17714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95113",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.17714",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95115",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.18099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95156",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.18099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95154",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.18099",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95143",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-4658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5131"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://git.gnome.org/browse/libxml2/commit/?id=c1d1f7121194036608bf555f08d3062a36fd344b"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1615",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1615"
                },
                {
                    "reference_url": "https://support.apple.com/HT207141",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT207141"
                },
                {
                    "reference_url": "https://support.apple.com/HT207142",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT207142"
                },
                {
                    "reference_url": "https://support.apple.com/HT207143",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT207143"
                },
                {
                    "reference_url": "https://support.apple.com/HT207170",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/HT207170"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384424",
                    "reference_id": "1384424",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1384424"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840553",
                    "reference_id": "840553",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=840553"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201611-2",
                    "reference_id": "ASA-201611-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201611-2"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-56",
                    "reference_id": "AVG-56",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-56"
                },
                {
                    "reference_url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4448.html",
                    "reference_id": "CVE-2016-4448.HTML",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4448.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4658",
                    "reference_id": "CVE-2016-4658",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4658"
                },
                {
                    "reference_url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4658.html",
                    "reference_id": "CVE-2016-4658.HTML",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-4658.html"
                },
                {
                    "reference_url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5131.html",
                    "reference_id": "CVE-2016-5131.HTML",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5131.html"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fr52-4hqw-p27f",
                    "reference_id": "GHSA-fr52-4hqw-p27f",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fr52-4hqw-p27f"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201701-37",
                    "reference_id": "GLSA-201701-37",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201701-37"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3810",
                    "reference_id": "RHSA-2021:3810",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3810"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3235-1/",
                    "reference_id": "USN-3235-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3235-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/23172?format=api",
                    "purl": "pkg:gem/nokogiri@1.7.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.7.1"
                }
            ],
            "aliases": [
                "CVE-2016-4658",
                "GHSA-fr52-4hqw-p27f"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ecde-c15q-ukh1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44702?format=api",
            "vulnerability_id": "VCID-ek5d-m9pn-3fec",
            "summary": "Multiple vulnerabilities have been found in libxml2, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3517.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2884",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28891",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28821",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2893",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28889",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00107",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28934",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29474",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29358",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0011",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29427",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3517"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954232"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3517"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3517.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3517.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/7c19ef5cc6b7c5c36827dd5495f857c6877ec8cf/CHANGELOG.md?plain=1#L579",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/7c19ef5cc6b7c5c36827dd5495f857c6877ec8cf/CHANGELOG.md?plain=1#L579"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/2233",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/2233"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/2274",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/2274"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3517"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210625-0002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210625-0002"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210625-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210625-0002/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211022-0004/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987738",
                    "reference_id": "987738",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987738"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1883",
                    "reference_id": "AVG-1883",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1883"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/",
                    "reference_id": "BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jw9f-hh49-cvp9",
                    "reference_id": "GHSA-jw9f-hh49-cvp9",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jw9f-hh49-cvp9"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-05",
                    "reference_id": "GLSA-202107-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202107-05"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/",
                    "reference_id": "QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T21:32:30Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2569",
                    "reference_id": "RHSA-2021:2569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1389",
                    "reference_id": "RHSA-2022:1389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1390",
                    "reference_id": "RHSA-2022:1390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1390"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4991-1/",
                    "reference_id": "USN-4991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37340?format=api",
                    "purl": "pkg:gem/nokogiri@1.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.11.4"
                }
            ],
            "aliases": [
                "CVE-2021-3517",
                "GHSA-jw9f-hh49-cvp9"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ek5d-m9pn-3fec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/20000?format=api",
            "vulnerability_id": "VCID-ghbk-uumc-dug3",
            "summary": "Nokogiri updates packaged libxml2 to v2.12.7 to resolve CVE-2024-34459\n## Summary\n\nNokogiri v1.16.5 upgrades its dependency libxml2 to [2.12.7](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.12.7) from 2.12.6.\n\nlibxml2 v2.12.7 addresses CVE-2024-34459:\n\n- described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/720\n- patched by https://gitlab.gnome.org/GNOME/libxml2/-/commit/2876ac53\n\n\n## Impact\n\nThere is no impact to Nokogiri users because the issue is present only in libxml2's `xmllint` tool which Nokogiri does not provide or expose.\n\n\n## Timeline\n\n- 2024-05-13 05:57 EDT, libxml2 2.12.7 release is announced\n- 2024-05-13 08:30 EDT, nokogiri maintainers begin triage\n- 2024-05-13 10:05 EDT, nokogiri [v1.16.5 is released](https://github.com/sparklemotion/nokogiri/releases/tag/v1.16.5) and this GHSA made public",
            "references": [
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-r95h-9x8f-r3f7.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-r95h-9x8f-r3f7.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.16.5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.16.5"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-r95h-9x8f-r3f7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-r95h-9x8f-r3f7"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/2876ac53",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/2876ac53"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/720",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/720"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r95h-9x8f-r3f7",
                    "reference_id": "GHSA-r95h-9x8f-r3f7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r95h-9x8f-r3f7"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/60556?format=api",
                    "purl": "pkg:gem/nokogiri@1.16.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.16.5"
                }
            ],
            "aliases": [
                "GHSA-r95h-9x8f-r3f7"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ghbk-uumc-dug3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13707?format=api",
            "vulnerability_id": "VCID-gsar-pymk-43hs",
            "summary": "Out-of-bounds Write in zlib affects Nokogiri\n## Summary\n\nNokogiri v1.13.4 updates the vendored zlib from 1.2.11 to 1.2.12, which addresses [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032). That CVE is scored as CVSS 7.4 \"High\" on the NVD record as of 2022-04-05.\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.4`, and only if the packaged version of `zlib` is being used. Please see [this document](https://nokogiri.org/LICENSE-DEPENDENCIES.html#default-platform-release-ruby) for a complete description of which platform gems vendor `zlib`. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `zlib` release announcements. \n\n## Mitigation\n\nUpgrade to Nokogiri `>= v1.13.4`.\n\n## Impact\n\n### [CVE-2018-25032](https://nvd.nist.gov/vuln/detail/CVE-2018-25032) in zlib\n\n- **Severity**: High\n- **Type**: [CWE-787](https://cwe.mitre.org/data/definitions/787.html) Out of bounds write\n- **Description**: zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4"
                },
                {
                    "reference_url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032",
                    "reference_id": "CVE-2018-25032",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jc36-42cf-vqwj",
                    "reference_id": "GHSA-jc36-42cf-vqwj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jc36-42cf-vqwj"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-v6gp-9mmm-c6p5",
                    "reference_id": "GHSA-v6gp-9mmm-c6p5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-v6gp-9mmm-c6p5"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5",
                    "reference_id": "GHSA-v6gp-9mmm-c6p5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48280?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.4"
                }
            ],
            "aliases": [
                "GHSA-v6gp-9mmm-c6p5",
                "GMS-2022-787"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gsar-pymk-43hs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16508?format=api",
            "vulnerability_id": "VCID-hzjv-gf8n-jka2",
            "summary": "Duplicate Advisory: Use-after-free in libxml2 via Nokogiri::XML::Reader\n# Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-xc9x-jj77-9p9j. This link is maintained to preserve external references.\n\n# Original Description\n\n### Summary\n\nNokogiri upgrades its dependency libxml2 as follows:\n- v1.15.6 upgrades libxml2 to 2.11.7 from 2.11.6\n- v1.16.2 upgrades libxml2 to 2.12.5 from 2.12.4\n\nlibxml2 v2.11.7 and v2.12.5 address the following vulnerability:\n\nCVE-2024-25062 / https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062\n- described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/604\n- patched by https://gitlab.gnome.org/GNOME/libxml2/-/commit/92721970\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri, and only if\nthe packaged libraries are being used. If you've overridden defaults at installation time to use\nsystem libraries instead of packaged libraries, you should instead pay attention to your distro's\nlibxml2 release announcements.\n\nJRuby users are not affected.\n\n### Severity\n\nThe Nokogiri maintainers have evaluated this as **Moderate**.\n\n### Impact\n\nFrom the CVE description, this issue applies to the `xmlTextReader` module (which underlies\n`Nokogiri::XML::Reader`):\n\n> When using the XML Reader interface with DTD validation and XInclude expansion enabled,\n> processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.\n\n### Mitigation\n\nUpgrade to Nokogiri `~> 1.15.6` or `>= 1.16.2`.\n\nUsers who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile\nand link Nokogiri against patched external libxml2 libraries which will also address these same\nissues.",
            "references": [
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-xc9x-jj77-9p9j.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-xc9x-jj77-9p9j.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xc9x-jj77-9p9j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xc9x-jj77-9p9j"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vcc3-rw6f-jv97",
                    "reference_id": "GHSA-vcc3-rw6f-jv97",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vcc3-rw6f-jv97"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54411?format=api",
                    "purl": "pkg:gem/nokogiri@1.15.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.15.6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/54407?format=api",
                    "purl": "pkg:gem/nokogiri@1.16.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.16.2"
                }
            ],
            "aliases": [
                "GHSA-vcc3-rw6f-jv97"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hzjv-gf8n-jka2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13711?format=api",
            "vulnerability_id": "VCID-jqdg-ebz9-t3e9",
            "summary": "XML Injection in Xerces Java affects Nokogiri\n## Summary\n\nNokogiri v1.13.4 updates the vendored `xerces:xercesImpl` from 2.12.0 to 2.12.2, which addresses [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437). That CVE is scored as CVSS 6.5 \"Medium\" on the NVD record.\n\nPlease note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.\n\n## Mitigation\n\nUpgrade to Nokogiri `>= v1.13.4`.\n\n## Impact\n\n### [CVE-2022-23437](https://nvd.nist.gov/vuln/detail/CVE-2022-23437) in xerces-J\n\n- **Severity**: Medium\n- **Type**: [CWE-91](https://cwe.mitre.org/data/definitions/91.html) XML Injection (aka Blind XPath Injection)\n- **Description**: There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.\n- **See also**: https://github.com/advisories/GHSA-h65f-jvqw-m9fj",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4"
                },
                {
                    "reference_url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23437",
                    "reference_id": "CVE-2022-23437",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-23437"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-h65f-jvqw-m9fj",
                    "reference_id": "GHSA-h65f-jvqw-m9fj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-h65f-jvqw-m9fj"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-xxx9-3xcr-gjj3",
                    "reference_id": "GHSA-xxx9-3xcr-gjj3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-xxx9-3xcr-gjj3"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3",
                    "reference_id": "GHSA-xxx9-3xcr-gjj3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xxx9-3xcr-gjj3"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48280?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.4"
                }
            ],
            "aliases": [
                "GHSA-xxx9-3xcr-gjj3",
                "GMS-2022-788"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqdg-ebz9-t3e9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55433?format=api",
            "vulnerability_id": "VCID-m7km-hbm9-23h4",
            "summary": "Integer Overflow or Wraparound in libxml2 affects Nokogiri\n### Summary\n\nNokogiri v1.13.5 upgrades the packaged version of its dependency libxml2 from v2.9.13 to [v2.9.14](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14).\n\nlibxml2 v2.9.14 addresses [CVE-2022-29824](https://nvd.nist.gov/vuln/detail/CVE-2022-29824). This version also includes several security-related bug fixes for which CVEs were not created, including a potential double-free, potential memory leaks, and integer-overflow.\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.13.5`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` and `libxslt` release announcements.\n\n\n### Mitigation\n\nUpgrade to Nokogiri `>= 1.13.5`.\n\nUsers who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link Nokogiri against external libraries libxml2 `>= 2.9.14` which will also address these same issues.\n\n\n### Impact\n\n#### libxml2 [CVE-2022-29824](https://nvd.nist.gov/vuln/detail/CVE-2022-29824)\n\n- **CVSS3 score**:\n  - Unspecified upstream\n  - Nokogiri maintainers evaluate at 8.6 (High) ([CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)) Note that this is different from the CVSS assessed by NVD.\n- **Type**: Denial of service, information disclosure\n- **Description**: In libxml2 before 2.9.14, several buffer handling functions in buf.c (xmlBuf*) and tree.c (xmlBuffer*) don't check for integer overflows. This can result in out-of-bounds memory writes. Exploitation requires a victim to open a crafted, multi-gigabyte XML file. Other software using libxml2's buffer functions, for example libxslt through 1.1.35, is affected as well.\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/2554a24\n\nAll versions of libml2 prior to v2.9.14 are affected.\n\nApplications parsing or serializing multi-gigabyte documents (in excess of INT_MAX bytes) may be vulnerable to an integer overflow bug in buffer handling that could lead to exposure of confidential data, modification of unrelated data, or a segmentation fault resulting in a denial-of-service.\n\n\n### References\n\n- [libxml2 v2.9.14 release notes](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14)\n- [CVE-2022-29824](https://nvd.nist.gov/vuln/detail/CVE-2022-29824)\n- [CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer](https://cwe.mitre.org/data/definitions/119.html)",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-cgx6-hpwq-fhv5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-cgx6-hpwq-fhv5"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.9.14"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29824",
                    "reference_id": "CVE-2022-29824",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.6",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29824"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-cgx6-hpwq-fhv5",
                    "reference_id": "GHSA-cgx6-hpwq-fhv5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-cgx6-hpwq-fhv5"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/82523?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.5"
                }
            ],
            "aliases": [
                "GHSA-cgx6-hpwq-fhv5",
                "GMS-2022-1438"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m7km-hbm9-23h4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47690?format=api",
            "vulnerability_id": "VCID-n6za-rwad-tbaq",
            "summary": "Nokogiri updates packaged dependency on libxml2 from 2.9.10 to 2.9.12\n### Summary\n\nNokogiri v1.11.4 updates the vendored libxml2 from v2.9.10 to v2.9.12 which addresses:\n\n- [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388) (Medium severity)\n- [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977) (Medium severity)\n- [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517) (Medium severity)\n- [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518) (Medium severity)\n- [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537) (Low severity)\n- [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541) (Low severity)\n\nNote that two additional CVEs were addressed upstream but are not relevant to this release. [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516) via `xmllint` is not present in Nokogiri, and [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595) has been patched in Nokogiri since v1.10.8 (see #1992).\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.11.4`, and only if the packaged version of libxml2 is being used. If you've overridden defaults at installation time to use system libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements.\n\n\n### Mitigation\n\nUpgrade to Nokogiri `>= 1.11.4`.\n\n\n### Impact\n\nI've done a brief analysis of the published CVEs that are addressed in this upstream release. The libxml2 maintainers have not released a canonical set of CVEs, and so this list is pieced together from secondary sources and may be incomplete.\n\nAll information below is sourced from [security.archlinux.org](https://security.archlinux.org), which appears to have the most up-to-date information as of this analysis.\n\n#### [CVE-2019-20388](https://security.archlinux.org/CVE-2019-20388)\n\n- **Severity**: Medium\n- **Type**: Denial of service\n- **Description**: A memory leak was found in the xmlSchemaValidateStream function of libxml2. Applications that use this library may be vulnerable to memory not being freed leading to a denial of service.\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/7ffcd44d7e6c46704f8af0321d9314cd26e0e18a\n\nVerified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.\n\n\n#### [CVE-2020-7595](https://security.archlinux.org/CVE-2020-7595)\n\n- **Severity**: Medium\n- **Type**: Denial of service\n- **Description**: xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c8907645d2e155f0d89d4d9895ac5112b5\n\nThis has been patched in Nokogiri since v1.10.8 (see #1992).\n\n\n#### [CVE-2020-24977](https://security.archlinux.org/CVE-2020-24977)\n\n- **Severity**: Medium\n- **Type**: Information disclosure\n- **Description**: GNOME project libxml2 <= 2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c.\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2\n\nVerified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.\n\n\n#### [CVE-2021-3516](https://security.archlinux.org/CVE-2021-3516)\n\n- **Severity**: Medium\n- **Type**: Arbitrary code execution (no remote vector)\n- **Description**: A use-after-free security issue was found libxml2 before version 2.9.11 when \"xmllint --html --push\" is used to process crafted files.\n- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/230\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1358d157d0bd83be1dfe356a69213df9fac0b539\n\nVerified that the fix commit first appears in v2.9.11. This vector does not exist within Nokogiri, which does not ship `xmllint`.\n\n\n#### [CVE-2021-3517](https://security.archlinux.org/CVE-2021-3517)\n\n- **Severity**: Medium\n- **Type**: Arbitrary code execution\n- **Description**: A heap-based buffer overflow was found in libxml2 before version 2.9.11 when processing truncated UTF-8 input.\n- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/235\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/bf22713507fe1fc3a2c4b525cf0a88c2dc87a3a2\n\nVerified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.\n\n\n#### [CVE-2021-3518](https://security.archlinux.org/CVE-2021-3518)\n\n- **Severity**: Medium\n- **Type**: Arbitrary code execution\n- **Description**: A use-after-free security issue was found in libxml2 before version 2.9.11 in xmlXIncludeDoProcess() in xinclude.c when processing crafted files.\n- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/237\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/1098c30a040e72a4654968547f415be4e4c40fe7\n\nVerified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.\n\n\n#### [CVE-2021-3537](https://security.archlinux.org/CVE-2021-3537)\n\n- **Severity**: Low\n- **Type**: Denial of service\n- **Description**: It was found that libxml2 before version 2.9.11 did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application.\n- **Issue**: https://gitlab.gnome.org/GNOME/libxml2/-/issues/243\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/babe75030c7f64a37826bb3342317134568bef61\n\nVerified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4.\n\n\n#### [CVE-2021-3541](https://security.archlinux.org/CVE-2021-3541)\n\n- **Severity**: Low\n- **Type**: Denial of service\n- **Description**: A security issue was found in libxml2 before version 2.9.11. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.\n- **Fixed**: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e\n\nVerified that the fix commit first appears in v2.9.11. It seems possible that this issue would be present in programs using Nokogiri < v1.11.4, however Nokogiri's default parse options prevent the attack from succeeding (it is necessary to opt into `DTDLOAD` which is off by default).\n\nFor more details supporting this analysis of this CVE, please visit #2233.",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/9b90a8854f74b5f672a437ba0043a503bc259d1b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/9b90a8854f74b5f672a437ba0043a503bc259d1b"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-7rrm-v45f-jp64"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541",
                    "reference_id": "CVE-2021-3541",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7rrm-v45f-jp64",
                    "reference_id": "GHSA-7rrm-v45f-jp64",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7rrm-v45f-jp64"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37340?format=api",
                    "purl": "pkg:gem/nokogiri@1.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.11.4"
                }
            ],
            "aliases": [
                "GHSA-7rrm-v45f-jp64",
                "GMS-2021-171"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n6za-rwad-tbaq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13078?format=api",
            "vulnerability_id": "VCID-nq12-ryyt-c7g9",
            "summary": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in nokogiri.",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fq42-c5rg-92c2",
                    "reference_id": "GHSA-fq42-c5rg-92c2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fq42-c5rg-92c2"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2",
                    "reference_id": "GHSA-fq42-c5rg-92c2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/46643?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.2"
                }
            ],
            "aliases": [
                "GHSA-fq42-c5rg-92c2",
                "GMS-2022-163"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nq12-ryyt-c7g9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/26312?format=api",
            "vulnerability_id": "VCID-q732-nexj-1ue6",
            "summary": "Duplicate Advisory: Nokogiri updates packaged libxml2 to 2.13.6 to resolve CVE-2025-24928 and CVE-2024-56171\n# Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-vvfq-8hwr-qm4m. This link is maintained to preserve external references.\n\n# Original Description\n\n## Summary\n\nNokogiri v1.18.3 upgrades its dependency libxml2 to\n[v2.13.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6).\n\nlibxml2 v2.13.6 addresses:\n\n- CVE-2025-24928\n  - described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/847\n- CVE-2024-56171\n   - described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/828\n\n## Impact\n\n### CVE-2025-24928\n\nStack-buffer overflow is possible when reporting DTD validation\nerrors if the input contains a long (~3kb) QName prefix.\n\n### CVE-2024-56171\n\nUse-after-free is possible during validation against untrusted\nXML Schemas (.xsd) and, potentially, validation of untrusted documents\nagainst trusted Schemas if they make use of `xsd:keyref` in combination\nwith recursively defined types that have additional identity constraints.",
            "references": [
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-vvfq-8hwr-qm4m.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-vvfq-8hwr-qm4m.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vvfq-8hwr-qm4m",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vvfq-8hwr-qm4m"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-5mwf-688x-mr7x",
                    "reference_id": "GHSA-5mwf-688x-mr7x",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-5mwf-688x-mr7x"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/69405?format=api",
                    "purl": "pkg:gem/nokogiri@1.18.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.18.3"
                }
            ],
            "aliases": [
                "GHSA-5mwf-688x-mr7x"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q732-nexj-1ue6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33329?format=api",
            "vulnerability_id": "VCID-qv3r-ppuc-zycz",
            "summary": "libxml as used in Nokogiri has an infinite loop in a certain end-of-file situation\nxmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.\nThe Nokogiri RubyGem has patched its vendored copy of libxml2 in order to prevent this issue from affecting nokogiri.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00047.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7595.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-7595.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7595",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64712",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6472",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64672",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64751",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6474",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00473",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64734",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65326",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65375",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00487",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65401",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-7595"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2020-7595.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2020-7595.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1992"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-7595"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202010-04",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202010-04"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200702-0005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200702-0005"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200702-0005/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200702-0005/"
                },
                {
                    "reference_url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4274-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4274-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4274-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4274-1/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2020.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786",
                    "reference_id": "1799786",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1799786"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/",
                    "reference_id": "545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/545SPOI3ZPPNPX4TFRIVE4JVRTJRKULL/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/",
                    "reference_id": "5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5R55ZR52RMBX24TQTWHCIWKJVRV6YAWI/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949582",
                    "reference_id": "949582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=949582"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202011-15",
                    "reference_id": "ASA-202011-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202011-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1263",
                    "reference_id": "AVG-1263",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1263"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7553-jr98-vx47",
                    "reference_id": "GHSA-7553-jr98-vx47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7553-jr98-vx47"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/",
                    "reference_id": "JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track*",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2025-12-03T15:33:37Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JDPF3AAVKUAKDYFMFKSIQSVVS3EEFPQH/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2644",
                    "reference_id": "RHSA-2020:2644",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2644"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2646",
                    "reference_id": "RHSA-2020:2646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2646"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3996",
                    "reference_id": "RHSA-2020:3996",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3996"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4479",
                    "reference_id": "RHSA-2020:4479",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4479"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949",
                    "reference_id": "RHSA-2021:0949",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:0949"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73119?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.8"
                }
            ],
            "aliases": [
                "CVE-2020-7595",
                "GHSA-7553-jr98-vx47"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qv3r-ppuc-zycz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10893?format=api",
            "vulnerability_id": "VCID-rsvx-3f49-v3an",
            "summary": "Improper Restriction of Recursive Entity References in DTDs (XML Entity Expansion)\nA flaw was found in libxml2. By exploiting an exponential entity expansion attack its possible bypassing all existing protection mechanisms and lead to a denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3541.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18918",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.1887",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18968",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18921",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19054",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.19106",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18828",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18907",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0006",
                            "scoring_system": "epss",
                            "scoring_elements": "0.18962",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3541"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950515"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3541"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210805-0007/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20210805-0007/"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988603",
                    "reference_id": "988603",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988603"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1883",
                    "reference_id": "AVG-1883",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1883"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541",
                    "reference_id": "CVE-2021-3541",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3541"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-05",
                    "reference_id": "GLSA-202107-05",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202107-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2569",
                    "reference_id": "RHSA-2021:2569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1389",
                    "reference_id": "RHSA-2022:1389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1390",
                    "reference_id": "RHSA-2022:1390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1390"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4991-1/",
                    "reference_id": "USN-4991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37340?format=api",
                    "purl": "pkg:gem/nokogiri@1.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.11.4"
                }
            ],
            "aliases": [
                "CVE-2021-3541"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rsvx-3f49-v3an"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47092?format=api",
            "vulnerability_id": "VCID-snr1-kaug-43aa",
            "summary": "Multiple vulnerabilities have been discovered in Nokogiri, the worst of which could result in denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29181.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-29181.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88682",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8871",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88717",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88705",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04183",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88699",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88835",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04293",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88819",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-29181"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29181"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/23"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2022-29181.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2022-29181.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/83cc451c3f29df397caa890afc3b714eae6ab8f7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:41:19Z/"
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/83cc451c3f29df397caa890afc3b714eae6ab8f7"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:41:19Z/"
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/db05ba9a1bd4b90aa6c76742cf6102a7c7297267"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:41:19Z/"
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.6"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:41:19Z/"
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-xh29-r2w5-wx8m"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29181"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-29",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202208-29"
                },
                {
                    "reference_url": "https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-22T15:41:19Z/"
                        }
                    ],
                    "url": "https://securitylab.github.com/advisories/GHSL-2022-031_GHSL-2022-032_Nokogiri"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213532",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213532"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088684",
                    "reference_id": "2088684",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2088684"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-xh29-r2w5-wx8m",
                    "reference_id": "GHSA-xh29-r2w5-wx8m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-xh29-r2w5-wx8m"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8506",
                    "reference_id": "RHSA-2022:8506",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8506"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7659-1/",
                    "reference_id": "USN-7659-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7659-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/84314?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.6"
                }
            ],
            "aliases": [
                "CVE-2022-29181",
                "GHSA-xh29-r2w5-wx8m"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-snr1-kaug-43aa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8917?format=api",
            "vulnerability_id": "VCID-sqa5-8yrd-qyfz",
            "summary": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nIn the Loofah gem for Ruby, denylisted HTML attributes may occur in sanitized output by republishing a crafted HTML fragment.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8048.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8048.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71756",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71728",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71721",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71747",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71716",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71755",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71766",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71774",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7179",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-8048"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8048",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8048"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-x7rv-cr6v-4vm4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-x7rv-cr6v-4vm4"
                },
                {
                    "reference_url": "https://github.com/flavorjones/loofah",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/flavorjones/loofah"
                },
                {
                    "reference_url": "https://github.com/flavorjones/loofah/commit/f739cf8eac5851f328b8044281d6653f74eff116",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/flavorjones/loofah/commit/f739cf8eac5851f328b8044281d6653f74eff116"
                },
                {
                    "reference_url": "https://github.com/flavorjones/loofah/issues/144",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/flavorjones/loofah/issues/144"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2018-8048.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/loofah/CVE-2018-8048.yml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-8048.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-8048.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/pull/1746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/pull/1746"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191122-0003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191122-0003"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191122-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20191122-0003/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4171",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4171"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2018/03/19/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2018/03/19/5"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559071",
                    "reference_id": "1559071",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1559071"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893596",
                    "reference_id": "893596",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893596"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8048",
                    "reference_id": "CVE-2018-8048",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-8048"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/27193?format=api",
                    "purl": "pkg:gem/nokogiri@1.8.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.8.3"
                }
            ],
            "aliases": [
                "CVE-2018-8048",
                "GHSA-x7rv-cr6v-4vm4"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sqa5-8yrd-qyfz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55120?format=api",
            "vulnerability_id": "VCID-sxp3-vtcq-pugw",
            "summary": "Nokogiri affected by libxslt Use of Uninitialized Resource/Use After Free vulnerability\nIn xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.\n\nNokogiri prior to version 1.10.5 contains a vulnerable version of libxslt. Nokogiri version 1.10.5 upgrades the dependency to libxslt 1.1.34, which contains a patch for this issue.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00015.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00025.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0514",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0514"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18197.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-18197.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89173",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89177",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89167",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89161",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89143",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89141",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89126",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89118",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04534",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89171",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-18197"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15746"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15768"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=15914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18197"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-18197.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-18197.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/01ab95f3e37429ed8d3b380a8d2f73902eb325d9/CHANGELOG.md?plain=1#L934",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/01ab95f3e37429ed8d3b380a8d2f73902eb325d9/CHANGELOG.md?plain=1#L934"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1943"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxslt/commit/2232473733b7313d67de8836ea3b29eec6e8e285"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00037.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00037.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-18197"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191031-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191031-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191031-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20191031-0004/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20200416-0004/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4164-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4164-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/11/17/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2019/11/17/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770768",
                    "reference_id": "1770768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1770768"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942646",
                    "reference_id": "942646",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942646"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202002-3",
                    "reference_id": "ASA-202002-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202002-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1092",
                    "reference_id": "AVG-1092",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1092"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:1.1.33:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxslt:1.1.33:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:1.1.33:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-242x-7cm6-4w8j",
                    "reference_id": "GHSA-242x-7cm6-4w8j",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-242x-7cm6-4w8j"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4005",
                    "reference_id": "RHSA-2020:4005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4005"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4464",
                    "reference_id": "RHSA-2020:4464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4464"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4164-1/",
                    "reference_id": "USN-4164-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4164-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37248?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.5"
                }
            ],
            "aliases": [
                "CVE-2019-18197",
                "GHSA-242x-7cm6-4w8j"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sxp3-vtcq-pugw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10565?format=api",
            "vulnerability_id": "VCID-tdt5-asvh-ryaa",
            "summary": "Bypass of a protection mechanism in libxslt\nThe libxslt binary, which is included in nokogiri, allows bypass of a protection mechanism because callers of `xsltCheckRead` and `xsltCheckWrite` permit access even upon receiving a -1 error code. `xsltCheckRead` can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00048.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00052.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00053.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00025.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00001.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11068.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-11068.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78295",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78291",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78285",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78259",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78277",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78246",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78238",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78317",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01127",
                            "scoring_system": "epss",
                            "scoring_elements": "0.783",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-11068"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-11068.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-11068.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/f7aa3b0b29d6fe5fafe93dacd9b96b6b3d16b7ec/CHANGELOG.md?plain=1#L826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/f7aa3b0b29d6fe5fafe93dacd9b96b6b3d16b7ec/CHANGELOG.md?plain=1#L826"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/fe034aedcc59b566740567d621843731686676b9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/fe034aedcc59b566740567d621843731686676b9"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1892",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1892"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/pull/1898",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/pull/1898"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00016.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00016.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/36TEYN37XCCKN2XUMRTBBW67BPNMSW4K/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GCOAX2IHUMKCM3ILHTMGLHCDSBTLP2JU/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SK4YNISS22MJY22YX5I6V2U63QZAUEHA/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191017-0001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20191017-0001"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20191017-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20191017-0001/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3947-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3947-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3947-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3947-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3947-2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3947-2"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3947-2/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3947-2/"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/22/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2019/04/22/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/04/23/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2019/04/23/5"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709697",
                    "reference_id": "1709697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1709697"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926895",
                    "reference_id": "926895",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=926895"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_id": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_management_plug-ins:-:*:*:*:*:vmware_vcenter:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_id": "cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:8.0:update_221:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:8.0:update_221:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:8.0:update_221:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11068",
                    "reference_id": "CVE-2019-11068",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11068"
                },
                {
                    "reference_url": "https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11068",
                    "reference_id": "CVE-2019-11068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://people.canonical.com/~ubuntu-security/cve/CVE-2019-11068"
                },
                {
                    "reference_url": "https://security-tracker.debian.org/tracker/CVE-2019-11068",
                    "reference_id": "CVE-2019-11068",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security-tracker.debian.org/tracker/CVE-2019-11068"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-qxcg-xjjg-66mj",
                    "reference_id": "GHSA-qxcg-xjjg-66mj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-qxcg-xjjg-66mj"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4005",
                    "reference_id": "RHSA-2020:4005",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4005"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:4464",
                    "reference_id": "RHSA-2020:4464",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:4464"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/83261?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.3"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/35955?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.4"
                }
            ],
            "aliases": [
                "CVE-2019-11068",
                "GHSA-qxcg-xjjg-66mj"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tdt5-asvh-ryaa"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9793?format=api",
            "vulnerability_id": "VCID-tn87-vke6-kuf6",
            "summary": "Use After Free\nUse after free in libxml2, as used in Google Chrome and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2017:3401",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2017:3401"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:0287",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:0287"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15412.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15412.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83181",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83187",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83149",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83174",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83191",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01891",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83197",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01943",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8337",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01943",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83383",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01943",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83398",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-15412"
                },
                {
                    "reference_url": "https://bugzilla.gnome.org/show_bug.cgi?id=783160",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.gnome.org/show_bug.cgi?id=783160"
                },
                {
                    "reference_url": "https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html"
                },
                {
                    "reference_url": "https://crbug.com/727039",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://crbug.com/727039"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15412"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-15412.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-15412.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1714",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1714"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2017/12/msg00014.html"
                },
                {
                    "reference_url": "https://web.archive.org/web/20201208155618/http://www.securitytracker.com/id/1040348",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20201208155618/http://www.securitytracker.com/id/1040348"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4086",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4086"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523128",
                    "reference_id": "1523128",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523128"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883790",
                    "reference_id": "883790",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=883790"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201712-5",
                    "reference_id": "ASA-201712-5",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201712-5"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-544",
                    "reference_id": "AVG-544",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-544"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15412",
                    "reference_id": "CVE-2017-15412",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-15412"
                },
                {
                    "reference_url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html",
                    "reference_id": "CVE-2017-15412.HTML",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://people.canonical.com/~ubuntu-security/cve/2017/CVE-2017-15412.html"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r58r-74gx-6wx3",
                    "reference_id": "GHSA-r58r-74gx-6wx3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r58r-74gx-6wx3"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-03",
                    "reference_id": "GLSA-201801-03",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/201801-03"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1190",
                    "reference_id": "RHSA-2020:1190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1190"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3513-1/",
                    "reference_id": "USN-3513-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3513-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3513-2/",
                    "reference_id": "USN-3513-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3513-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/27494?format=api",
                    "purl": "pkg:gem/nokogiri@1.8.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.8.2"
                }
            ],
            "aliases": [
                "CVE-2017-15412",
                "GHSA-r58r-74gx-6wx3"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tn87-vke6-kuf6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/10825?format=api",
            "vulnerability_id": "VCID-txm2-sdc1-7uch",
            "summary": "Improper Input Validation\nIn `numbers.c` in libxslt, which is used by nokogiri, an `xsl:number` with certain format strings could lead to an uninitialized read in `xsltNumberFormatInsertNumbers`. This could allow an attacker to discern whether a byte on the stack contains the characters `[AaIi0]`, or any other character.",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00062.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13117.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-13117.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-13117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89074",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89078",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89066",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89062",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89044",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89043",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89019",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89072",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04457",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89027",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-13117"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=14471"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13117"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-13117.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-13117.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/1943",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/1943"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxslt/commit/c5eb6cf3aba0af048596106ed839b4ae17ecbcb1"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/07/msg00020.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IOYJKXPQCUNBMMQJWYXOR6QRUJZHEDRZ/"
                },
                {
                    "reference_url": "https://oss-fuzz.com/testcase-detail/5631739747106816",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://oss-fuzz.com/testcase-detail/5631739747106816"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190806-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190806-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190806-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190806-0004/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200122-0003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20200122-0003"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20200122-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20200122-0003/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4164-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/4164-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2020.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2019/11/17/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2019/11/17/2"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728546",
                    "reference_id": "1728546",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1728546"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931321",
                    "reference_id": "931321",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931321"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13117",
                    "reference_id": "CVE-2019-13117",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-13117"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4hm9-844j-jmxp",
                    "reference_id": "GHSA-4hm9-844j-jmxp",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4hm9-844j-jmxp"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4164-1/",
                    "reference_id": "USN-4164-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4164-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37248?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.5"
                }
            ],
            "aliases": [
                "CVE-2019-13117",
                "GHSA-4hm9-844j-jmxp"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-txm2-sdc1-7uch"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13701?format=api",
            "vulnerability_id": "VCID-u8gx-xbj9-97c7",
            "summary": "Denial of Service (DoS) in Nokogiri on JRuby\n## Summary\n\nNokogiri `v1.13.4` updates the vendored `org.cyberneko.html` library to `1.9.22.noko2` which addresses [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv). That CVE is rated 7.5 (High Severity).\n\nSee [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) for more information.\n\nPlease note that this advisory only applies to the **JRuby** implementation of Nokogiri `< 1.13.4`.\n\n\n## Mitigation\n\nUpgrade to Nokogiri `>= 1.13.4`.\n\n\n## Impact\n\n### [CVE-2022-24839](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv) in nekohtml\n\n- **Severity**: High 7.5\n- **Type**: [CWE-400](https://cwe.mitre.org/data/definitions/400.html) Uncontrolled Resource Consumption\n- **Description**: The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup.\n- **See also**: [GHSA-9849-p7jc-9rmv](https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv)",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.4"
                },
                {
                    "reference_url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ"
                },
                {
                    "reference_url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://groups.google.com/g/ruby-security-ann/c/vX7qSjsvWis/m/TJWN4oOKBwAJ?utm_medium=email&utm_source=footer"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24839",
                    "reference_id": "CVE-2022-24839",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-24839"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv",
                    "reference_id": "GHSA-9849-p7jc-9rmv",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-gx8x-g87m-h5q6",
                    "reference_id": "GHSA-gx8x-g87m-h5q6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-gx8x-g87m-h5q6"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6",
                    "reference_id": "GHSA-gx8x-g87m-h5q6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-gx8x-g87m-h5q6"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48280?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.4"
                }
            ],
            "aliases": [
                "GHSA-gx8x-g87m-h5q6",
                "GMS-2022-786"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u8gx-xbj9-97c7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57378?format=api",
            "vulnerability_id": "VCID-udew-3gre-13hy",
            "summary": "Multiple vulnerabilities have been found in libxml2, the worst of which could result in arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40303.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-40303.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39746",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39712",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39768",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39687",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39741",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39755",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39765",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00181",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39729",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-40303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40303"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40304"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3"
                },
                {
                    "reference_url": "https://nokogiri.org/CHANGELOG.html#1139-2022-10-18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nokogiri.org/CHANGELOG.html#1139-2022-10-18"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022224",
                    "reference_id": "1022224",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1022224"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/21",
                    "reference_id": "21",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/21"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136266",
                    "reference_id": "2136266",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2136266"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/24",
                    "reference_id": "24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/24"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/25",
                    "reference_id": "25",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/25"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/26",
                    "reference_id": "26",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/26"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/Dec/27",
                    "reference_id": "27",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/Dec/27"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40303",
                    "reference_id": "CVE-2022-40303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-40303"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-39",
                    "reference_id": "GLSA-202210-39",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202210-39"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213531",
                    "reference_id": "HT213531",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213531"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213533",
                    "reference_id": "HT213533",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213533"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213534",
                    "reference_id": "HT213534",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213534"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213535",
                    "reference_id": "HT213535",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213535"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213536",
                    "reference_id": "HT213536",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213536"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20221209-0003/",
                    "reference_id": "ntap-20221209-0003",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-29T04:23:26Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20221209-0003/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841",
                    "reference_id": "RHSA-2022:8841",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8841"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0173",
                    "reference_id": "RHSA-2023:0173",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0173"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0338",
                    "reference_id": "RHSA-2023:0338",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0338"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0413",
                    "reference_id": "RHSA-2024:0413",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0413"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5760-1/",
                    "reference_id": "USN-5760-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5760-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5760-2/",
                    "reference_id": "USN-5760-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5760-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7659-1/",
                    "reference_id": "USN-7659-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7659-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79742?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.9",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eru7-uy2t-d3ef"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.9"
                }
            ],
            "aliases": [
                "CVE-2022-40303"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-udew-3gre-13hy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/29287?format=api",
            "vulnerability_id": "VCID-uf9q-1ds5-wbev",
            "summary": "Nokogiri updates packaged libxslt to v1.1.43 to resolve multiple CVEs\n## Summary\n\nNokogiri v1.18.4 upgrades its dependency libxslt to [v1.1.43](https://gitlab.gnome.org/GNOME/libxslt/-/releases/v1.1.43).\n\nlibxslt v1.1.43 resolves:\n\n- CVE-2025-24855: Fix use-after-free of XPath context node\n- CVE-2024-55549: Fix UAF related to excluded namespaces\n\n## Impact\n\n### CVE-2025-24855\n\n- \"Use-after-free due to xsltEvalXPathStringNs leaking xpathCtxt->node\"\n- MITRE has rated this 7.8 High CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H\n- Upstream report: https://gitlab.gnome.org/GNOME/libxslt/-/issues/128\n- NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2025-24855\n\n### CVE-2024-55549\n\n- \"Use-after-free related to excluded result prefixes\"\n- MITRE has rated this 7.8 High CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H\n- Upstream report: https://gitlab.gnome.org/GNOME/libxslt/-/issues/127\n- NVD entry: https://nvd.nist.gov/vuln/detail/CVE-2024-55549",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-mrxw-mxhj-p664",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-mrxw-mxhj-p664"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/127",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/127"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/128",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/128"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55549",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55549"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24855"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-mrxw-mxhj-p664",
                    "reference_id": "GHSA-mrxw-mxhj-p664",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-mrxw-mxhj-p664"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/70147?format=api",
                    "purl": "pkg:gem/nokogiri@1.18.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.18.4"
                }
            ],
            "aliases": [
                "GHSA-mrxw-mxhj-p664"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uf9q-1ds5-wbev"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7207?format=api",
            "vulnerability_id": "VCID-v226-z8ay-sue4",
            "summary": "Unsafe parsing of unclosed comments\nParsing an unclosed comment can result in `Conditional jump or move depends on uninitialised value(s)` and unsafe memory access.",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/master/CHANGELOG.rdoc#167rc4--2015-11-22",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/master/CHANGELOG.rdoc#167rc4--2015-11-22"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/v1.6.6.x/CHANGELOG.rdoc#1664--2015-11-19",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/v1.6.6.x/CHANGELOG.rdoc#1664--2015-11-19"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/0948e9fa38c949661983a33752fdcb94a453e272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/0948e9fa38c949661983a33752fdcb94a453e272"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/3ab1b2339f7bb3a00590c8d288a24a9dbfe5aec4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/3ab1b2339f7bb3a00590c8d288a24a9dbfe5aec4"
                },
                {
                    "reference_url": "https://groups.google.com/forum/#!topic/nokogiri-talk/nFl0mfcJpbk",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://groups.google.com/forum/#!topic/nokogiri-talk/nFl0mfcJpbk"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/21188?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.6.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-64ca-973e-nfgm"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.6.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/21189?format=api",
                    "purl": "pkg:gem/nokogiri@1.6.7.rc4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-64ca-973e-nfgm"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.6.7.rc4"
                }
            ],
            "aliases": [
                "GMS-2015-43"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v226-z8ay-sue4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44705?format=api",
            "vulnerability_id": "VCID-vf7b-s3y3-sfhw",
            "summary": "Multiple vulnerabilities have been found in libxml2, the worst of\n    which could result in a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3537.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29532",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29584",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34266",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.34299",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0014",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33927",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3626",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36337",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36331",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00155",
                            "scoring_system": "epss",
                            "scoring_elements": "0.36309",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3537"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1956522"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3537"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3537.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2021-3537.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/2edbbef95f1dc12c1ddc5ebda71b9159026245fe/CHANGELOG.md?plain=1#L722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/2edbbef95f1dc12c1ddc5ebda71b9159026245fe/CHANGELOG.md?plain=1#L722"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/"
                },
                {
                    "reference_url": "https://nokogiri.org/CHANGELOG.html#1114-2021-05-14",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nokogiri.org/CHANGELOG.html#1114-2021-05-14"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3537"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210625-0002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210625-0002"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210625-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20210625-0002/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988123",
                    "reference_id": "988123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=988123"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1883",
                    "reference_id": "AVG-1883",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1883"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-286v-pcf5-25rc",
                    "reference_id": "GHSA-286v-pcf5-25rc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-286v-pcf5-25rc"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202107-05",
                    "reference_id": "GLSA-202107-05",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202107-05"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2569",
                    "reference_id": "RHSA-2021:2569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2569"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1389",
                    "reference_id": "RHSA-2022:1389",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1389"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1390",
                    "reference_id": "RHSA-2022:1390",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1390"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4991-1/",
                    "reference_id": "USN-4991-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4991-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37340?format=api",
                    "purl": "pkg:gem/nokogiri@1.11.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.11.4"
                }
            ],
            "aliases": [
                "CVE-2021-3537",
                "GHSA-286v-pcf5-25rc"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vf7b-s3y3-sfhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33287?format=api",
            "vulnerability_id": "VCID-vhyk-9tbb-quc3",
            "summary": "Nokogiri::XML::Schema trusts input by default, exposing risk of XXE vulnerability\n### Severity\n\nNokogiri maintainers have evaluated this as [__Low Severity__ (CVSS3 2.6)](https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N).\n\n\n### Description\n\nIn Nokogiri versions <= 1.11.0.rc3, XML Schemas parsed by `Nokogiri::XML::Schema` are **trusted** by default, allowing external resources to be accessed over the network, potentially enabling XXE or SSRF attacks.\n\nThis behavior is counter to the security policy followed by Nokogiri maintainers, which is to treat all input as **untrusted** by default whenever possible.\n\nPlease note that this security fix was pushed into a new minor version, 1.11.x, rather than a patch release to the 1.10.x branch, because it is a breaking change for some schemas and the risk was assessed to be \"Low Severity\".\n\n\n### Affected Versions\n\nNokogiri `<= 1.10.10` as well as prereleases `1.11.0.rc1`, `1.11.0.rc2`, and `1.11.0.rc3`\n\n\n### Mitigation\n\nThere are no known workarounds for affected versions. Upgrade to Nokogiri `1.11.0.rc4` or later.\n\nIf, after upgrading to `1.11.0.rc4` or later, you wish to re-enable network access for resolution of external resources (i.e., return to the previous behavior):\n\n1. Ensure the input is trusted. Do not enable this option for untrusted input.\n2. When invoking the `Nokogiri::XML::Schema` constructor, pass as the second parameter an instance of `Nokogiri::XML::ParseOptions` with the `NONET` flag turned off.\n\nSo if your previous code was:\n\n``` ruby\n# in v1.11.0.rc3 and earlier, this call allows resources to be accessed over the network\n# but in v1.11.0.rc4 and later, this call will disallow network access for external resources\nschema = Nokogiri::XML::Schema.new(schema)\n\n# in v1.11.0.rc4 and later, the following is equivalent to the code above\n# (the second parameter is optional, and this demonstrates its default value)\nschema = Nokogiri::XML::Schema.new(schema, Nokogiri::XML::ParseOptions::DEFAULT_SCHEMA)\n```\n\nThen you can add the second parameter to indicate that the input is trusted by changing it to:\n\n``` ruby\n# in v1.11.0.rc3 and earlier, this would raise an ArgumentError \n# but in v1.11.0.rc4 and later, this allows resources to be accessed over the network\nschema = Nokogiri::XML::Schema.new(trusted_schema, Nokogiri::XML::ParseOptions.new.nononet)\n```\n\n\n### References\n\n- [This issue's public advisory](https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m)\n- [Original Hackerone report (private)](https://hackerone.com/reports/747489)\n- [OWASP description of XXE attack](https://www.owasp.org/index.php/XML_External_Entity_(XXE)_Processing)\n- [OWASP description of SSRF attack](https://www.owasp.org/index.php/Server_Side_Request_Forgery)\n\n\n### Credit \n\nThis vulnerability was independently reported by @eric-therond and @gucki.\n\nThe Nokogiri maintainers would like to thank [HackerOne](https://hackerone.com/nokogiri) for providing a secure, responsible mechanism for reporting, and for providing their fantastic service to us.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26247.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-26247.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72425",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72434",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72451",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72428",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72416",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72377",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72399",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72381",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00717",
                            "scoring_system": "epss",
                            "scoring_elements": "0.72376",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26247"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26247"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2020-26247.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2020-26247.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md#v1110--2021-01-03",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/blob/main/CHANGELOG.md#v1110--2021-01-03"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/9c87439d9afa14a365ff13e73adc809cb2c3d97b"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/releases/tag/v1.11.0.rc4"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.6",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vr8q-g5c7-m54m"
                },
                {
                    "reference_url": "https://hackerone.com/reports/747489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://hackerone.com/reports/747489"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00007.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/10/msg00018.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26247",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26247"
                },
                {
                    "reference_url": "https://rubygems.org/gems/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://rubygems.org/gems/nokogiri"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202208-29",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202208-29"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912487",
                    "reference_id": "1912487",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1912487"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978967",
                    "reference_id": "978967",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=978967"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vr8q-g5c7-m54m",
                    "reference_id": "GHSA-vr8q-g5c7-m54m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vr8q-g5c7-m54m"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4702",
                    "reference_id": "RHSA-2021:4702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4702"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5191",
                    "reference_id": "RHSA-2021:5191",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5191"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7659-1/",
                    "reference_id": "USN-7659-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7659-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73073?format=api",
                    "purl": "pkg:gem/nokogiri@1.11.0",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.11.0"
                }
            ],
            "aliases": [
                "CVE-2020-26247",
                "GHSA-vr8q-g5c7-m54m"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vhyk-9tbb-quc3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/25543?format=api",
            "vulnerability_id": "VCID-w8jf-tsmr-g7cd",
            "summary": "Nokogiri updates packaged libxml2 to v2.13.8 to resolve CVE-2025-32414 and CVE-2025-32415\n## Summary\n\nNokogiri v1.18.8 upgrades its dependency libxml2 to [v2.13.8](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.8).\n\nlibxml2 v2.13.8 addresses:\n\n- CVE-2025-32414\n  - described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/889\n- CVE-2025-32415\n  - described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/890\n\n## Impact\n\n### CVE-2025-32414: No impact\n\nIn libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.\n\n**There is no impact** from this CVE for Nokogiri users.\n\n\n### CVE-2025-32415: Low impact\n\nIn libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.\n\nIn the upstream issue, further context is provided by the maintainer:\n\n> The bug affects validation against untrusted XML Schemas (.xsd) and validation of untrusted\n> documents against trusted Schemas if they make use of xsd:keyref in combination with recursively\n> defined types that have additional identity constraints.\n\nMITRE has published a severity score of 2.9 LOW (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) for this CVE.",
            "references": [
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-5w6v-399v-w3cc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-5w6v-399v-w3cc"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/890",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/890"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.8",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.8"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-5w6v-399v-w3cc",
                    "reference_id": "GHSA-5w6v-399v-w3cc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-5w6v-399v-w3cc"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/68763?format=api",
                    "purl": "pkg:gem/nokogiri@1.18.8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.18.8"
                }
            ],
            "aliases": [
                "GHSA-5w6v-399v-w3cc"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w8jf-tsmr-g7cd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/8947?format=api",
            "vulnerability_id": "VCID-wc4g-sxyq-ubcd",
            "summary": "Allocation of Resources Without Limits or Throttling\nThe xz_head function in xzlib.c in libxml2 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18258.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-18258.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73872",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7388",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73824",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73876",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73898",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73833",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73858",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73829",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0079",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73863",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18258"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-18258.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2017-18258.yml"
                },
                {
                    "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10284",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10284"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00035.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190719-0001",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190719-0001"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190719-0001/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190719-0001/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3739-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3739-1"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3739-1/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3739-1/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566749",
                    "reference_id": "1566749",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1566749"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895245",
                    "reference_id": "895245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895245"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-671",
                    "reference_id": "AVG-671",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-671"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258",
                    "reference_id": "CVE-2017-18258",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-882p-jqgm-f45g",
                    "reference_id": "GHSA-882p-jqgm-f45g",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-882p-jqgm-f45g"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:1190",
                    "reference_id": "RHSA-2020:1190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:1190"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/27494?format=api",
                    "purl": "pkg:gem/nokogiri@1.8.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.8.2"
                }
            ],
            "aliases": [
                "CVE-2017-18258",
                "GHSA-882p-jqgm-f45g"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wc4g-sxyq-ubcd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13518?format=api",
            "vulnerability_id": "VCID-xd6j-x83x-r3gn",
            "summary": "Out-of-bounds Write\nzlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.2",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-25032.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-25032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24064",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.24102",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00081",
                            "scoring_system": "epss",
                            "scoring_elements": "0.23937",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25394",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2535",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25282",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25311",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25364",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00089",
                            "scoring_system": "epss",
                            "scoring_elements": "0.25406",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-25032"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/May/33",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/May/33"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/May/35",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/May/35"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2022/May/38",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2022/May/38"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531"
                },
                {
                    "reference_url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://github.com/madler/zlib/compare/v1.2.11...v1.2.12"
                },
                {
                    "reference_url": "https://github.com/madler/zlib/issues/605",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://github.com/madler/zlib/issues/605"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00000.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00008.html"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00023.html"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202210-42",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202210-42"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220526-0009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220526-0009"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220526-0009/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220526-0009/"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220729-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220729-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220729-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220729-0004/"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213255",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213255"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213256",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213256"
                },
                {
                    "reference_url": "https://support.apple.com/kb/HT213257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://support.apple.com/kb/HT213257"
                },
                {
                    "reference_url": "https://www.debian.org/security/2022/dsa-5111",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://www.debian.org/security/2022/dsa-5111"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/03/24/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/03/24/1"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/03/28/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/03/28/1"
                },
                {
                    "reference_url": "https://www.openwall.com/lists/oss-security/2022/03/28/3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://www.openwall.com/lists/oss-security/2022/03/28/3"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/03/25/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/03/25/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2022/03/26/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "http://www.openwall.com/lists/oss-security/2022/03/26/1"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265",
                    "reference_id": "1008265",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008265"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945",
                    "reference_id": "2067945",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2067945"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202204-3",
                    "reference_id": "ASA-202204-3",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202204-3"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2657",
                    "reference_id": "AVG-2657",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2657"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032",
                    "reference_id": "CVE-2018-25032",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25032"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml",
                    "reference_id": "CVE-2018-25032.YML",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2018-25032.yml"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/",
                    "reference_id": "DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DCZFIJBJTZ7CL5QXBFKTQ22Q26VINRUF/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/",
                    "reference_id": "DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-jc36-42cf-vqwj",
                    "reference_id": "GHSA-jc36-42cf-vqwj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-jc36-42cf-vqwj"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5",
                    "reference_id": "GHSA-v6gp-9mmm-c6p5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202405-22",
                    "reference_id": "GLSA-202405-22",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202405-22"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/",
                    "reference_id": "JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JZZPTWRYQULAOL3AW7RZJNVZ2UONXCV4/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/",
                    "reference_id": "NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NS2D2GFPFGOJUL4WQ3DUAY7HF4VWQ77F/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1591",
                    "reference_id": "RHSA-2022:1591",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1591"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1642",
                    "reference_id": "RHSA-2022:1642",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1642"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1661",
                    "reference_id": "RHSA-2022:1661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2192",
                    "reference_id": "RHSA-2022:2192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2192"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2197",
                    "reference_id": "RHSA-2022:2197",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2197"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2198",
                    "reference_id": "RHSA-2022:2198",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2198"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2201",
                    "reference_id": "RHSA-2022:2201",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2201"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2213",
                    "reference_id": "RHSA-2022:2213",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2213"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:2214",
                    "reference_id": "RHSA-2022:2214",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:2214"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4584",
                    "reference_id": "RHSA-2022:4584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4584"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4592",
                    "reference_id": "RHSA-2022:4592",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4592"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4845",
                    "reference_id": "RHSA-2022:4845",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4845"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:4896",
                    "reference_id": "RHSA-2022:4896",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:4896"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5439",
                    "reference_id": "RHSA-2022:5439",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5439"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7144",
                    "reference_id": "RHSA-2022:7144",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7144"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:7813",
                    "reference_id": "RHSA-2022:7813",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:7813"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8420",
                    "reference_id": "RHSA-2022:8420",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8420"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0943",
                    "reference_id": "RHSA-2023:0943",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0943"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0975",
                    "reference_id": "RHSA-2023:0975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0975"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:0976",
                    "reference_id": "RHSA-2023:0976",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:0976"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5355-1/",
                    "reference_id": "USN-5355-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5355-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5355-2/",
                    "reference_id": "USN-5355-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5355-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5359-1/",
                    "reference_id": "USN-5359-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5359-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5359-2/",
                    "reference_id": "USN-5359-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5359-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5739-1/",
                    "reference_id": "USN-5739-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5739-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6736-1/",
                    "reference_id": "USN-6736-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6736-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6736-2/",
                    "reference_id": "USN-6736-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6736-2/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/",
                    "reference_id": "VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VOKNP2L734AEL47NRYGVZIKEFOUBQY5Y/"
                },
                {
                    "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/",
                    "reference_id": "XOKFMSNQ5D5WGMALBNBXU3GE442V74WU",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:30:25Z/"
                        }
                    ],
                    "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XOKFMSNQ5D5WGMALBNBXU3GE442V74WU/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48280?format=api",
                    "purl": "pkg:gem/nokogiri@1.13.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.13.4"
                }
            ],
            "aliases": [
                "CVE-2018-25032",
                "GHSA-jc36-42cf-vqwj"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xd6j-x83x-r3gn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/17148?format=api",
            "vulnerability_id": "VCID-y5vb-sn4p-eqd9",
            "summary": "Nokogiri updates packaged libxml2 to v2.10.4 to resolve multiple CVEs\n### Summary\n\nNokogiri v1.14.3 upgrades the packaged version of its dependency libxml2 to [v2.10.4](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4) from v2.10.3.\n\nlibxml2 v2.10.4 addresses the following known vulnerabilities:\n\n- [CVE-2023-29469](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469): Hashing of empty dict strings isn't deterministic\n- [CVE-2023-28484](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484): Fix null deref in xmlSchemaFixupComplexType\n- Schemas: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK\n\nPlease note that this advisory only applies to the CRuby implementation of Nokogiri `< 1.14.3`, and only if the _packaged_ libraries are being used. If you've overridden defaults at installation time to use _system_ libraries instead of packaged libraries, you should instead pay attention to your distro's `libxml2` release announcements.\n\n\n### Mitigation\n\nUpgrade to Nokogiri `>= 1.14.3`.\n\nUsers who are unable to upgrade Nokogiri may also choose a more complicated mitigation: compile and link Nokogiri against external libraries libxml2 `>= 2.10.4` which will also address these same issues.\n\n\n### Impact\n\nNo public information has yet been published about the security-related issues other than the upstream commits. Examination of those changesets indicate that the more serious issues relate to libxml2 dereferencing NULL pointers and potentially segfaulting while parsing untrusted inputs.\n\nThe commits can be examined at:\n\n- [[CVE-2023-29469] Hashing of empty dict strings isn't deterministic (09a2dd45) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/09a2dd453007f9c7205274623acdd73747c22d64)\n- [[CVE-2023-28484] Fix null deref in xmlSchemaFixupComplexType (647e072e) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/647e072ea0a2f12687fa05c172f4c4713fdb0c4f)\n- [schemas: Fix null-pointer-deref in xmlSchemaCheckCOSSTDerivedOK (4c6922f7) · Commits · GNOME / libxml2 · GitLab](https://gitlab.gnome.org/GNOME/libxml2/-/commit/4c6922f763ad958c48ff66f82823ae21f2e92ee6)",
            "references": [
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/09a2dd453007f9c7205274623acdd73747c22d64",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/09a2dd453007f9c7205274623acdd73747c22d64"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/4c6922f763ad958c48ff66f82823ae21f2e92ee6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/4c6922f763ad958c48ff66f82823ae21f2e92ee6"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/647e072ea0a2f12687fa05c172f4c4713fdb0c4f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/commit/647e072ea0a2f12687fa05c172f4c4713fdb0c4f"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-pxvg-2qj5-37jq",
                    "reference_id": "GHSA-pxvg-2qj5-37jq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-pxvg-2qj5-37jq"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-pxvg-2qj5-37jq",
                    "reference_id": "GHSA-pxvg-2qj5-37jq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-pxvg-2qj5-37jq"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/56849?format=api",
                    "purl": "pkg:gem/nokogiri@1.14.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.14.3"
                }
            ],
            "aliases": [
                "GHSA-pxvg-2qj5-37jq",
                "GMS-2023-1115"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y5vb-sn4p-eqd9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/26719?format=api",
            "vulnerability_id": "VCID-yeku-1zjh-kbea",
            "summary": "Nokogiri updates packaged libxml2 to 2.13.6 to resolve CVE-2025-24928 and CVE-2024-56171\n## Summary\n\nNokogiri v1.18.3 upgrades its dependency libxml2 to [v2.13.6](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.13.6).\n\nlibxml2 v2.13.6 addresses:\n\n- CVE-2025-24928\n  - described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/847\n- CVE-2024-56171\n   - described at https://gitlab.gnome.org/GNOME/libxml2/-/issues/828\n\n## Impact\n\n### CVE-2025-24928\n\nStack-buffer overflow is possible when reporting DTD validation errors if the input contains a long (~3kb) QName prefix.\n\n### CVE-2024-56171\n\nUse-after-free is possible during validation against untrusted XML Schemas (.xsd) and, potentially, validation of untrusted documents against trusted Schemas if they make use of `xsd:keyref` in combination with recursively defined types that have additional identity constraints.",
            "references": [
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-vvfq-8hwr-qm4m.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/GHSA-vvfq-8hwr-qm4m.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vvfq-8hwr-qm4m",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-vvfq-8hwr-qm4m"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vvfq-8hwr-qm4m",
                    "reference_id": "GHSA-vvfq-8hwr-qm4m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vvfq-8hwr-qm4m"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/69405?format=api",
                    "purl": "pkg:gem/nokogiri@1.18.3",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.18.3"
                }
            ],
            "aliases": [
                "GHSA-vvfq-8hwr-qm4m"
            ],
            "risk_score": 1.4,
            "exploitability": "0.5",
            "weighted_severity": "2.7",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yeku-1zjh-kbea"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/52034?format=api",
            "vulnerability_id": "VCID-zrsc-vqxk-vkgx",
            "summary": "Nokogiri is vulnerable to XML External Entity (XXE) attack\nNokogiri before 1.5.4 is vulnerable to XXE attacks.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6685.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6685.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55336",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55357",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55376",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55397",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55387",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55355",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55232",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00323",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5533",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-6685"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1178970"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6685"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/commit/599856367150709497a3a03bee930bd76504d95d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/sparklemotion/nokogiri/commit/599856367150709497a3a03bee930bd76504d95d"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/693",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/693"
                },
                {
                    "reference_url": "https://nokogiri.org/CHANGELOG.html#154-2012-06-12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nokogiri.org/CHANGELOG.html#154-2012-06-12"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6685",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-6685"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-6wj9-77wq-jq7p",
                    "reference_id": "GHSA-6wj9-77wq-jq7p",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-6wj9-77wq-jq7p"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/79897?format=api",
                    "purl": "pkg:gem/nokogiri@1.5.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-22km-jmtd-yyde"
                        },
                        {
                            "vulnerability": "VCID-2b1g-gp84-87e8"
                        },
                        {
                            "vulnerability": "VCID-2dje-jsyy-cqbe"
                        },
                        {
                            "vulnerability": "VCID-2j62-5rjn-vyeu"
                        },
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-3f2w-tgya-x3cc"
                        },
                        {
                            "vulnerability": "VCID-3n8z-mqjc-6fh9"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-64c1-dzhs-u3gj"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-96v6-vs1m-skf3"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9p2f-ynzb-r3gj"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-azzy-m5pc-qudn"
                        },
                        {
                            "vulnerability": "VCID-b5tz-9s1v-pkg7"
                        },
                        {
                            "vulnerability": "VCID-bejh-22y7-kuh6"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ecde-c15q-ukh1"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-gxbt-wyyf-1yg8"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sqa5-8yrd-qyfz"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-tdt5-asvh-ryaa"
                        },
                        {
                            "vulnerability": "VCID-tn87-vke6-kuf6"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-v226-z8ay-sue4"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-wc4g-sxyq-ubcd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-xvhw-5776-s3fr"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        },
                        {
                            "vulnerability": "VCID-zwzs-qztz-wbfj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.5.4"
                }
            ],
            "aliases": [
                "CVE-2012-6685",
                "GHSA-6wj9-77wq-jq7p",
                "OSV-90946"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zrsc-vqxk-vkgx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/42308?format=api",
            "vulnerability_id": "VCID-zwzs-qztz-wbfj",
            "summary": "Multiple vulnerabilities have been found in Chromium and Google\n    Chrome, the worst of which could allow remote attackers to execute\n    arbitrary code.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5815.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-5815.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29549",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29606",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29673",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29723",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29543",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29643",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29646",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00111",
                            "scoring_system": "epss",
                            "scoring_elements": "0.29601",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-5815"
                },
                {
                    "reference_url": "https://bugs.chromium.org/p/chromium/issues/detail?id=930663",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.chromium.org/p/chromium/issues/detail?id=930663"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13698"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5805"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5806"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5807"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5808"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5809"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5810"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5811"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5813"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5814"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5815"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5818"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5819"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5820"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5821"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5822"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5823"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5824"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5825"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5826"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5827"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5828"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5829"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5830"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5831"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5832"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5833"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5834"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5836"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5837"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5838"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5839"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5840"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5841"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5842"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5843"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5847"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5848"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5849"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5850"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5851"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5852"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5853"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5854"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5855"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5856"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5857"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5858"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5859"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5860"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5862"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5864"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5865"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5867"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5868"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6503"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6504"
                },
                {
                    "reference_url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5815.yml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/nokogiri/CVE-2019-5815.yml"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri"
                },
                {
                    "reference_url": "https://github.com/sparklemotion/nokogiri/issues/2630",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": ""
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/sparklemotion/nokogiri/issues/2630"
                },
                {
                    "reference_url": "https://gitlab.gnome.org/GNOME/libxslt/commit/08b62c25871b38d5d573515ca8a065b4b8f64f6b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://gitlab.gnome.org/GNOME/libxslt/commit/08b62c25871b38d5d573515ca8a065b4b8f64f6b"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2022/09/msg00010.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5815",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-5815"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702905",
                    "reference_id": "1702905",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1702905"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201904-12",
                    "reference_id": "ASA-201904-12",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201904-12"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-952",
                    "reference_id": "AVG-952",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Critical",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-952"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-vmfx-gcfq-wvm2",
                    "reference_id": "GHSA-vmfx-gcfq-wvm2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-vmfx-gcfq-wvm2"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201908-18",
                    "reference_id": "GLSA-201908-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201908-18"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2019:1021",
                    "reference_id": "RHSA-2019:1021",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2019:1021"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5575-1/",
                    "reference_id": "USN-5575-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5575-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5575-2/",
                    "reference_id": "USN-5575-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5575-2/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/35955?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-sxp3-vtcq-pugw"
                        },
                        {
                            "vulnerability": "VCID-txm2-sdc1-7uch"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/37248?format=api",
                    "purl": "pkg:gem/nokogiri@1.10.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-365e-j8ta-h7cn"
                        },
                        {
                            "vulnerability": "VCID-43qu-922g-myca"
                        },
                        {
                            "vulnerability": "VCID-6r5w-pgkx-v3cb"
                        },
                        {
                            "vulnerability": "VCID-7bpp-2hvk-2udv"
                        },
                        {
                            "vulnerability": "VCID-8geh-vfns-pfgs"
                        },
                        {
                            "vulnerability": "VCID-9hqf-12yh-bkc8"
                        },
                        {
                            "vulnerability": "VCID-9wgc-swf9-z7hq"
                        },
                        {
                            "vulnerability": "VCID-c6hb-sbhx-zqac"
                        },
                        {
                            "vulnerability": "VCID-cbm2-cez4-bqgh"
                        },
                        {
                            "vulnerability": "VCID-eb6k-ppfd-m7a3"
                        },
                        {
                            "vulnerability": "VCID-ek5d-m9pn-3fec"
                        },
                        {
                            "vulnerability": "VCID-ghbk-uumc-dug3"
                        },
                        {
                            "vulnerability": "VCID-gsar-pymk-43hs"
                        },
                        {
                            "vulnerability": "VCID-hzjv-gf8n-jka2"
                        },
                        {
                            "vulnerability": "VCID-jfh3-1sgm-7ug2"
                        },
                        {
                            "vulnerability": "VCID-jqdg-ebz9-t3e9"
                        },
                        {
                            "vulnerability": "VCID-m7km-hbm9-23h4"
                        },
                        {
                            "vulnerability": "VCID-n6za-rwad-tbaq"
                        },
                        {
                            "vulnerability": "VCID-nq12-ryyt-c7g9"
                        },
                        {
                            "vulnerability": "VCID-q732-nexj-1ue6"
                        },
                        {
                            "vulnerability": "VCID-qv3r-ppuc-zycz"
                        },
                        {
                            "vulnerability": "VCID-rsvx-3f49-v3an"
                        },
                        {
                            "vulnerability": "VCID-snr1-kaug-43aa"
                        },
                        {
                            "vulnerability": "VCID-u8gx-xbj9-97c7"
                        },
                        {
                            "vulnerability": "VCID-udew-3gre-13hy"
                        },
                        {
                            "vulnerability": "VCID-uf9q-1ds5-wbev"
                        },
                        {
                            "vulnerability": "VCID-vf7b-s3y3-sfhw"
                        },
                        {
                            "vulnerability": "VCID-vhyk-9tbb-quc3"
                        },
                        {
                            "vulnerability": "VCID-w8jf-tsmr-g7cd"
                        },
                        {
                            "vulnerability": "VCID-xd6j-x83x-r3gn"
                        },
                        {
                            "vulnerability": "VCID-y5vb-sn4p-eqd9"
                        },
                        {
                            "vulnerability": "VCID-yeku-1zjh-kbea"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.10.5"
                }
            ],
            "aliases": [
                "CVE-2019-5815",
                "GHSA-vmfx-gcfq-wvm2"
            ],
            "risk_score": 4.5,
            "exploitability": "0.5",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zwzs-qztz-wbfj"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.5",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:gem/nokogiri@1.0.0"
}