Lookup for vulnerable packages by Package URL.

GET /api/packages/291663?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/291663?format=api",
    "purl": "pkg:maven/org.springframework/spring-core@5.2.13.RELEASE",
    "type": "maven",
    "namespace": "org.springframework",
    "name": "spring-core",
    "version": "5.2.13.RELEASE",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "5.2.24.RELEASE",
    "latest_non_vulnerable_version": "6.2.11",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/17213?format=api",
            "vulnerability_id": "VCID-6ysx-5wcw-f7b5",
            "summary": "Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')\nIn spring framework versions prior to 5.2.24 release+,5.3.27+ and 6.0.8+, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20863.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20863.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73737",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73745",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73763",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73742",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73729",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73694",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73721",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00783",
                            "scoring_system": "epss",
                            "scoring_elements": "0.73697",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7621",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20863"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20863",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20863"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/965a6392757d20f9db19241126fcc719a51eac15",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/965a6392757d20f9db19241126fcc719a51eac15"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/b73f5fcac22555f844cf27a7eeb876cb9d7f7f7e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/b73f5fcac22555f844cf27a7eeb876cb9d7f7f7e"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/ebc82654282bda547fbc20a9749ab1bda886a46f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/ebc82654282bda547fbc20a9749ab1bda886a46f"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0015"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187742",
                    "reference_id": "2187742",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187742"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20863",
                    "reference_id": "CVE-2023-20863",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20863"
                },
                {
                    "reference_url": "https://spring.io/security/cve-2023-20863",
                    "reference_id": "CVE-2023-20863",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:47:31Z/"
                        }
                    ],
                    "url": "https://spring.io/security/cve-2023-20863"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-wxqc-pxw9-g2p8",
                    "reference_id": "GHSA-wxqc-pxw9-g2p8",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-wxqc-pxw9-g2p8"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20240524-0015/",
                    "reference_id": "ntap-20240524-0015",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-07T16:47:31Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20240524-0015/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2099",
                    "reference_id": "RHSA-2023:2099",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2099"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2100",
                    "reference_id": "RHSA-2023:2100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2100"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/57006?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.24.RELEASE",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.24.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/57004?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.27",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.27"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/57005?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@6.0.8",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@6.0.8"
                }
            ],
            "aliases": [
                "CVE-2023-20863",
                "GHSA-wxqc-pxw9-g2p8"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ysx-5wcw-f7b5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13779?format=api",
            "vulnerability_id": "VCID-c74k-e1me-pfb2",
            "summary": "Improper Handling of Case Sensitivity\nIn Spring Framework versions 5.3.0 - 5.3.18, 5.2.0 - 5.2.20, and older unsupported versions, the patterns for disallowedFields on a DataBinder are case sensitive which means a field is not effectively protected unless it is listed with both upper and lower case for the first character of the field, including upper and lower case for the first character of all nested fields within the property path.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22968.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22968.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95566",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95558",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95557",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95555",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95551",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95541",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95538",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95548",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.2051",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95532",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22968"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22968",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22968"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/833e750175349ab4fd502109a8b41af77e25cdea",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/833e750175349ab4fd502109a8b41af77e25cdea"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/a7cf19cec5ebd270f97a194d749e2d5701ad2ab7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/a7cf19cec5ebd270f97a194d749e2d5701ad2ab7"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220602-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220602-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220602-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20220602-0004/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075441",
                    "reference_id": "2075441",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2075441"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22968",
                    "reference_id": "CVE-2022-22968",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22968"
                },
                {
                    "reference_url": "https://tanzu.vmware.com/security/cve-2022-22968",
                    "reference_id": "CVE-2022-22968",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tanzu.vmware.com/security/cve-2022-22968"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-g5mm-vmx4-3rg7",
                    "reference_id": "GHSA-g5mm-vmx4-3rg7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-g5mm-vmx4-3rg7"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5101",
                    "reference_id": "RHSA-2022:5101",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5101"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5532",
                    "reference_id": "RHSA-2022:5532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5532"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/49629?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.21",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.21"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/50701?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.21.RELEASE",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.21.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/49630?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.19",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.19"
                }
            ],
            "aliases": [
                "CVE-2022-22968",
                "GHSA-g5mm-vmx4-3rg7"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c74k-e1me-pfb2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57971?format=api",
            "vulnerability_id": "VCID-cpsj-4k25-wufe",
            "summary": "Improper Privilege Management in Spring Framework\nIn Spring Framework, versions 5.2.x prior to 5.2.15 and versions 5.3.x prior to 5.3.7, a WebFlux application is vulnerable to a privilege escalation: by (re)creating the temporary storage directory, a locally authenticated malicious user can read or modify files that have been uploaded to the WebFlux application, or overwrite arbitrary files with multipart request data.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22118.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22118.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48637",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48588",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48575",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48602",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48581",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48531",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48579",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48555",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4852",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00253",
                            "scoring_system": "epss",
                            "scoring_elements": "0.48585",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22118"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/0d0d75e25322d8161002d861fff3ec04ba8be5ac",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/0d0d75e25322d8161002d861fff3ec04ba8be5ac"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/cce60c479c22101f24b2b4abebb6d79440b120d1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/cce60c479c22101f24b2b4abebb6d79440b120d1"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/issues/26931",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/issues/26931"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22118"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210713-0005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20210713-0005"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20210713-0005/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20210713-0005/"
                },
                {
                    "reference_url": "https://spring.io/security/cve-2021-22118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://spring.io/security/cve-2021-22118"
                },
                {
                    "reference_url": "https://tanzu.vmware.com/security/cve-2021-22118",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tanzu.vmware.com/security/cve-2021-22118"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujan2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com//security-alerts/cpujul2021.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974854",
                    "reference_id": "1974854",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974854"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-gfwj-fwqj-fp3v",
                    "reference_id": "GHSA-gfwj-fwqj-fp3v",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-gfwj-fwqj-fp3v"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:3205",
                    "reference_id": "RHSA-2021:3205",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:3205"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4918",
                    "reference_id": "RHSA-2021:4918",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4918"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5134",
                    "reference_id": "RHSA-2021:5134",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5134"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/291664?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.14.RELEASE",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-c74k-e1me-pfb2"
                        },
                        {
                            "vulnerability": "VCID-cyjt-4vjn-mbc7"
                        },
                        {
                            "vulnerability": "VCID-dy4t-tm9m-rfex"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-ygpk-fb56-sqa4"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.14.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/993732?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.15",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.15"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/291676?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-c74k-e1me-pfb2"
                        },
                        {
                            "vulnerability": "VCID-cyjt-4vjn-mbc7"
                        },
                        {
                            "vulnerability": "VCID-dy4t-tm9m-rfex"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-ygpk-fb56-sqa4"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.7"
                }
            ],
            "aliases": [
                "CVE-2021-22118",
                "GHSA-gfwj-fwqj-fp3v"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cpsj-4k25-wufe"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13583?format=api",
            "vulnerability_id": "VCID-cyjt-4vjn-mbc7",
            "summary": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in org.springframework.boot:spring-boot-starter-webflux.",
            "references": [
                {
                    "reference_url": "http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:52:10Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/166713/Spring4Shell-Code-Execution.html"
                },
                {
                    "reference_url": "http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:52:10Z/"
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/167011/Spring4Shell-Spring-Framework-Class-Property-Remote-Code-Execution.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22965.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22965.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.94428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99984",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.94428",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99983",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22965"
                },
                {
                    "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:52:10Z/"
                        }
                    ],
                    "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22965"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-boot/releases/tag/v2.5.12"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-boot/releases/tag/v2.6.6"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.18"
                },
                {
                    "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:52:10Z/"
                        }
                    ],
                    "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0005"
                },
                {
                    "reference_url": "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement"
                },
                {
                    "reference_url": "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#suggested-workarounds",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://spring.io/blog/2022/03/31/spring-framework-rce-early-announcement#suggested-workarounds"
                },
                {
                    "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:52:10Z/"
                        }
                    ],
                    "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-java-spring-rce-Zx9GUc67"
                },
                {
                    "reference_url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22965",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-22965"
                },
                {
                    "reference_url": "https://www.kb.cert.org/vuls/id/970766",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.kb.cert.org/vuls/id/970766"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:52:10Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:52:10Z/"
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070348",
                    "reference_id": "2070348",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2070348"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22965",
                    "reference_id": "CVE-2022-22965",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22965"
                },
                {
                    "reference_url": "https://tanzu.vmware.com/security/cve-2022-22965",
                    "reference_id": "CVE-2022-22965",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H"
                        },
                        {
                            "value": "CRITICAL",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:52:10Z/"
                        }
                    ],
                    "url": "https://tanzu.vmware.com/security/cve-2022-22965"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-36p3-wjmg-h94x",
                    "reference_id": "GHSA-36p3-wjmg-h94x",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "CRITICAL",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-36p3-wjmg-h94x"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1306",
                    "reference_id": "RHSA-2022:1306",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1306"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1333",
                    "reference_id": "RHSA-2022:1333",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1333"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1360",
                    "reference_id": "RHSA-2022:1360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1360"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1378",
                    "reference_id": "RHSA-2022:1378",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1378"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1379",
                    "reference_id": "RHSA-2022:1379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1379"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1626",
                    "reference_id": "RHSA-2022:1626",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1626"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1627",
                    "reference_id": "RHSA-2022:1627",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1627"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7165-1/",
                    "reference_id": "USN-7165-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7165-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48425?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.20",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.20"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48474?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.20.RELEASE",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-c74k-e1me-pfb2"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.20.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48426?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.18",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-c74k-e1me-pfb2"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.18"
                }
            ],
            "aliases": [
                "CVE-2022-22965",
                "GHSA-36p3-wjmg-h94x",
                "GMS-2022-558",
                "GMS-2022-559",
                "GMS-2022-560",
                "GMS-2022-561"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "9.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cyjt-4vjn-mbc7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13605?format=api",
            "vulnerability_id": "VCID-dy4t-tm9m-rfex",
            "summary": "Allocation of Resources Without Limits or Throttling in Spring Framework\nIn Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a Denial of Service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22950.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22950.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88644",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88631",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88638",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88626",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88601",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88584",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88621",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04122",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88603",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22950"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22950",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22950"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/83ac65915871067c39a4fb255e0d484c785c0c11",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/83ac65915871067c39a4fb255e0d484c785c0c11"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/issues/28145",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/issues/28145"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/issues/28257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/issues/28257"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.2.20.RELEASE"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.17",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/releases/tag/v5.3.17"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069414",
                    "reference_id": "2069414",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2069414"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22950",
                    "reference_id": "CVE-2022-22950",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22950"
                },
                {
                    "reference_url": "https://tanzu.vmware.com/security/cve-2022-22950",
                    "reference_id": "CVE-2022-22950",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tanzu.vmware.com/security/cve-2022-22950"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-558x-2xjg-6232",
                    "reference_id": "GHSA-558x-2xjg-6232",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-558x-2xjg-6232"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5532",
                    "reference_id": "RHSA-2022:5532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5555",
                    "reference_id": "RHSA-2022:5555",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5555"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5903",
                    "reference_id": "RHSA-2022:5903",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5903"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:8761",
                    "reference_id": "RHSA-2022:8761",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:8761"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48474?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.20.RELEASE",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-c74k-e1me-pfb2"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.20.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/48475?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.17",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-c74k-e1me-pfb2"
                        },
                        {
                            "vulnerability": "VCID-cyjt-4vjn-mbc7"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.17"
                }
            ],
            "aliases": [
                "CVE-2022-22950",
                "GHSA-558x-2xjg-6232"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dy4t-tm9m-rfex"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/14657?format=api",
            "vulnerability_id": "VCID-k17s-ttg2-ubgj",
            "summary": "Allocation of Resources Without Limits or Throttling\nIn spring framework versions prior to 5.3.20+, 5.2.22+ and old unsupported versions, application with a STOMP over WebSocket endpoint is vulnerable to a denial of service attack by an authenticated user.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22971.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22971.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22971",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56648",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56617",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56639",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56663",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00338",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59793",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59742",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59772",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00386",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59748",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22971"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22971",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22971"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/159a99bbafdd6c01871228113d7042c3f83f360f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/159a99bbafdd6c01871228113d7042c3f83f360f"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/dc2947c52df18d5e99cad03383f7d6ba13d031fd",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/dc2947c52df18d5e99cad03383f7d6ba13d031fd"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220616-0003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220616-0003"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220616-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20220616-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087274",
                    "reference_id": "2087274",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087274"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22971",
                    "reference_id": "CVE-2022-22971",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22971"
                },
                {
                    "reference_url": "https://tanzu.vmware.com/security/cve-2022-22971",
                    "reference_id": "CVE-2022-22971",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tanzu.vmware.com/security/cve-2022-22971"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-rqph-vqwm-22vc",
                    "reference_id": "GHSA-rqph-vqwm-22vc",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-rqph-vqwm-22vc"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5532",
                    "reference_id": "RHSA-2022:5532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1661",
                    "reference_id": "RHSA-2023:1661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3185",
                    "reference_id": "RHSA-2023:3185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3185"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/50702?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.22.RELEASE",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.22.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/50703?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.20",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.20"
                }
            ],
            "aliases": [
                "CVE-2022-22971",
                "GHSA-rqph-vqwm-22vc"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-k17s-ttg2-ubgj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/14410?format=api",
            "vulnerability_id": "VCID-w6br-v2gm-j7gr",
            "summary": "Allocation of Resources Without Limits or Throttling\nIn spring framework versions prior to 5.3.20+, 5.2.22+ and old unsupported versions, applications that handle file uploads is vulnerable to DoS attack if they rely on data binding to set a MultipartFile or javax.servlet.Part to a field in a model object.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22970.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22970.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3733",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37283",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37311",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37345",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00164",
                            "scoring_system": "epss",
                            "scoring_elements": "0.37349",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40504",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40583",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00187",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40555",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-22970"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22970",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22970"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/50177b1ad3485bd44239b1756f6c14607476fcf2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/50177b1ad3485bd44239b1756f6c14607476fcf2"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/83186b689f11f5e6efe7ccc08fdeb92f66fcd583",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/83186b689f11f5e6efe7ccc08fdeb92f66fcd583"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220616-0006",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20220616-0006"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20220616-0006/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20220616-0006/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087272",
                    "reference_id": "2087272",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2087272"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22970",
                    "reference_id": "CVE-2022-22970",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22970"
                },
                {
                    "reference_url": "https://tanzu.vmware.com/security/cve-2022-22970",
                    "reference_id": "CVE-2022-22970",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tanzu.vmware.com/security/cve-2022-22970"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hh26-6xwr-ggv7",
                    "reference_id": "GHSA-hh26-6xwr-ggv7",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hh26-6xwr-ggv7"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5532",
                    "reference_id": "RHSA-2022:5532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:1661",
                    "reference_id": "RHSA-2023:1661",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:1661"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3185",
                    "reference_id": "RHSA-2023:3185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3185"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/50702?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.22.RELEASE",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.22.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/50703?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.20",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.20"
                }
            ],
            "aliases": [
                "CVE-2022-22970",
                "GHSA-hh26-6xwr-ggv7"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w6br-v2gm-j7gr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54907?format=api",
            "vulnerability_id": "VCID-ygpk-fb56-sqa4",
            "summary": "Improper Output Neutralization for Logs in Spring Framework\nIn Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22096.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-22096.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4476",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44626",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44707",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44727",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44664",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44716",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44719",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44735",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00221",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44704",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-22096"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22096"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-22096"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211125-0005",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211125-0005"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211125-0005/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20211125-0005/"
                },
                {
                    "reference_url": "https://tanzu.vmware.com/security/cve-2021-22096",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://tanzu.vmware.com/security/cve-2021-22096"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034584",
                    "reference_id": "2034584",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034584"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-rfmp-97jj-h8m6",
                    "reference_id": "GHSA-rfmp-97jj-h8m6",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-rfmp-97jj-h8m6"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1108",
                    "reference_id": "RHSA-2022:1108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1108"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1110",
                    "reference_id": "RHSA-2022:1110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1110"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5532",
                    "reference_id": "RHSA-2022:5532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5555",
                    "reference_id": "RHSA-2022:5555",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5555"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6393",
                    "reference_id": "RHSA-2022:6393",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6393"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/291667?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.17.RELEASE",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-c74k-e1me-pfb2"
                        },
                        {
                            "vulnerability": "VCID-cyjt-4vjn-mbc7"
                        },
                        {
                            "vulnerability": "VCID-dy4t-tm9m-rfex"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.17.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/82103?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.18",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.18"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/82102?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.11",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-c74k-e1me-pfb2"
                        },
                        {
                            "vulnerability": "VCID-cyjt-4vjn-mbc7"
                        },
                        {
                            "vulnerability": "VCID-dy4t-tm9m-rfex"
                        },
                        {
                            "vulnerability": "VCID-k17s-ttg2-ubgj"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        },
                        {
                            "vulnerability": "VCID-w6br-v2gm-j7gr"
                        },
                        {
                            "vulnerability": "VCID-z3th-j593-m7bg"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.11"
                }
            ],
            "aliases": [
                "CVE-2021-22096",
                "GHSA-rfmp-97jj-h8m6"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ygpk-fb56-sqa4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16858?format=api",
            "vulnerability_id": "VCID-z3th-j593-m7bg",
            "summary": "Spring Framework vulnerable to denial of service via specially crafted SpEL expression\nIn Spring Framework versions 6.0.0 - 6.0.6, 5.3.0 - 5.3.25, 5.2.0.RELEASE - 5.2.22.RELEASE, and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial-of-service (DoS) condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20861.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-20861.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57653",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57658",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.576",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57625",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00352",
                            "scoring_system": "epss",
                            "scoring_elements": "0.57604",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6129",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6125",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61269",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00409",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61283",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-20861"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20861",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20861"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/430fc25acad2e85cbdddcd52b64481691f03ebd1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/430fc25acad2e85cbdddcd52b64481691f03ebd1"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/52c93b1c4b24d70de233a958e60e7c5822bd274f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/52c93b1c4b24d70de233a958e60e7c5822bd274f"
                },
                {
                    "reference_url": "https://github.com/spring-projects/spring-framework/commit/935c29e3ddba5b19951e54f6685c70ed45d9cbe5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/spring-projects/spring-framework/commit/935c29e3ddba5b19951e54f6685c70ed45d9cbe5"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230420-0007",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230420-0007"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230420-0007/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-25T15:31:28Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230420-0007/"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180530",
                    "reference_id": "2180530",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180530"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861",
                    "reference_id": "CVE-2023-20861",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20861"
                },
                {
                    "reference_url": "https://spring.io/security/cve-2023-20861",
                    "reference_id": "CVE-2023-20861",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-25T15:31:28Z/"
                        }
                    ],
                    "url": "https://spring.io/security/cve-2023-20861"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-564r-hj7v-mcr5",
                    "reference_id": "GHSA-564r-hj7v-mcr5",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-564r-hj7v-mcr5"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:2100",
                    "reference_id": "RHSA-2023:2100",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:2100"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3185",
                    "reference_id": "RHSA-2023:3185",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3185"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3610",
                    "reference_id": "RHSA-2023:3610",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3610"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3622",
                    "reference_id": "RHSA-2023:3622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3622"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:3771",
                    "reference_id": "RHSA-2023:3771",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:3771"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:4983",
                    "reference_id": "RHSA-2023:4983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:4983"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0778",
                    "reference_id": "RHSA-2024:0778",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0778"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/56520?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.2.23.RELEASE",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.23.RELEASE"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/56517?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@5.3.26",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.3.26"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/56518?format=api",
                    "purl": "pkg:maven/org.springframework/spring-core@6.0.7",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-6ysx-5wcw-f7b5"
                        },
                        {
                            "vulnerability": "VCID-k2en-h5n1-r7gr"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@6.0.7"
                }
            ],
            "aliases": [
                "CVE-2023-20861",
                "GHSA-564r-hj7v-mcr5"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3th-j593-m7bg"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@5.2.13.RELEASE"
}