Lookup for vulnerable packages by Package URL.

GET /api/packages/929186?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/929186?format=api",
    "purl": "pkg:deb/debian/libxml-security-java@2.0.10-2%2Bdeb11u1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "libxml-security-java",
    "version": "2.0.10-2+deb11u1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.1.7-1",
    "latest_non_vulnerable_version": "2.1.8-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50742?format=api",
            "vulnerability_id": "VCID-degg-m3tz-9ubj",
            "summary": "Improper input validation in Apache Santuario XML Security for Java\nIn version 2.0.3 Apache Santuario XML Security for Java, a caching mechanism was introduced to speed up creating new XML documents using a static pool of DocumentBuilders. However, if some untrusted code can register a malicious implementation with the thread context class loader first, then this implementation might be cached and re-used by Apache Santuario - XML Security for Java, leading to potential security flaws when validating signed documents, etc. The vulnerability affects Apache Santuario - XML Security for Java 2.0.x releases from 2.0.3 and all 2.1.x releases before 2.1.4.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0804"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0805"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0806",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0806"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0811",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0811"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12400.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-12400.json"
                },
                {
                    "reference_url": "http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://santuario.apache.org/secadv.data/CVE-2019-12400.asc?version=1&modificationDate=1566573083000&api=v2"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6905",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69185",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69176",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69099",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69128",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69144",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69121",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69102",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69052",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69072",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69033",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69127",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69148",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00587",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69138",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-12400"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12400"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c@%3Cdev.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c@%3Cdev.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c%40%3Cdev.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/8e814b925bf580bc527d96ff51e72ffe5bdeaa4b8bf5b89498cab24c%40%3Cdev.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce@%3Cdev.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce@%3Cdev.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce%40%3Cdev.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/edaa7edb9c58e5f5bd0c950f2b6232b62b15f5c44ad803e8728308ce%40%3Cdev.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626%40%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r107bffb06a5e27457fe9af7dfe3a233d0d36c6c2f5122f117eb7f626%40%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4%40%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rcdc0da94fe21b26493eae47ca987a290bdf90c721a7a42491fdd41d4%40%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402%40%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf82be0a7c98cd3545e20817bb96ed05551ea0020acbaf9a469fef402%40%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03%40%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/rf958cea96236de8829940109ae07e870aa3d59235345421e4924ff03%40%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "1.9",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:L/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-12400"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190910-0003",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20190910-0003"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20190910-0003/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20190910-0003/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2021.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658",
                    "reference_id": "1764658",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764658"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935548",
                    "reference_id": "935548",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=935548"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:santuario_xml_security_for_java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4q98-wr72-h35w",
                    "reference_id": "GHSA-4q98-wr72-h35w",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4q98-wr72-h35w"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:0951",
                    "reference_id": "RHSA-2020:0951",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:0951"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:2067",
                    "reference_id": "RHSA-2020:2067",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:2067"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2020:3192",
                    "reference_id": "RHSA-2020:3192",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2020:3192"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929190?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.7-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.7-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929184?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.7-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.7-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929187?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.8-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2019-12400",
                "GHSA-4q98-wr72-h35w"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-degg-m3tz-9ubj"
        }
    ],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11249?format=api",
            "vulnerability_id": "VCID-46y3-rx34-pyc6",
            "summary": "Exposure of Sensitive Information to an Unauthorized Actor\nAll versions of Apache Santuario - XML Security for Java is vulnerable to an issue where the \"secureValidation\" property is not passed correctly when creating a KeyInfo from a KeyInfoReference element. This allows an attacker to abuse an XPath Transform to extract any local .xml files in a RetrievalMethod element.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-40690.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-40690.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40690",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51243",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51296",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51318",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5131",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51173",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51306",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51262",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51265",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51251",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51225",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51271",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00278",
                            "scoring_system": "epss",
                            "scoring_elements": "0.51284",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-40690"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40690",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40690"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/CXF-8613",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://issues.apache.org/jira/browse/CXF-8613"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r3b3f5ba9b0de8c9c125077b71af06026d344a709a8ba67db81ee9faa@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r401ecb7274794f040cd757b259ebe3e8c463ae74f7961209ccad3c59@%3Cissues.cxf.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r8848751b6a5dd78cc9e99d627e74fecfaffdfa1bb615dce827aad633%40%3Cdev.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r8a5c0ce9014bd07303aec1e5eed55951704878016465d3dae00e0c28@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r9c100d53c84d54cf71975e3f0cfcc2856a8846554a04c99390156ce4@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/raf352f95c19c0c4051af3180752cb69acbea88d0d066ab176c6170e8@%3Cuser.poi.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbbbac0759b12472abd0c278d32b5e0867bb21934df8e14e5e641597c@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/rbdac116aef912b563da54f4c152222c0754e32fb2f785519ac5e059f@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/re294cfc61f509512874ea514d8d64fd276253d54ac378ffa7a4880c8@%3Ccommits.tomee.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00015.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230818-0002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20230818-0002"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230818-0002/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230818-0002/"
                },
                {
                    "reference_url": "https://www.debian.org/security/2021/dsa-5010",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2021/dsa-5010"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpujul2022.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190",
                    "reference_id": "2011190",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011190"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994569",
                    "reference_id": "994569",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=994569"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690",
                    "reference_id": "CVE-2021-40690",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40690"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-j8wc-gxx9-82hx",
                    "reference_id": "GHSA-j8wc-gxx9-82hx",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-j8wc-gxx9-82hx"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4679",
                    "reference_id": "RHSA-2021:4679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4679"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5149",
                    "reference_id": "RHSA-2021:5149",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5149"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5150",
                    "reference_id": "RHSA-2021:5150",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5150"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5151",
                    "reference_id": "RHSA-2021:5151",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5151"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5154",
                    "reference_id": "RHSA-2021:5154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5154"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:5170",
                    "reference_id": "RHSA-2021:5170",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:5170"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0146",
                    "reference_id": "RHSA-2022:0146",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0146"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0151",
                    "reference_id": "RHSA-2022:0151",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0151"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0152",
                    "reference_id": "RHSA-2022:0152",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0152"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0155",
                    "reference_id": "RHSA-2022:0155",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0155"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0164",
                    "reference_id": "RHSA-2022:0164",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0164"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:0501",
                    "reference_id": "RHSA-2022:0501",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:0501"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:1013",
                    "reference_id": "RHSA-2022:1013",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:1013"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:5532",
                    "reference_id": "RHSA-2022:5532",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:5532"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2022:6407",
                    "reference_id": "RHSA-2022:6407",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2022:6407"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/5525-1/",
                    "reference_id": "USN-5525-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/5525-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929186?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.0.10-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-degg-m3tz-9ubj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.0.10-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929190?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.7-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.7-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929184?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.7-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.7-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929187?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.8-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2021-40690",
                "GHSA-j8wc-gxx9-82hx"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-46y3-rx34-pyc6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4933?format=api",
            "vulnerability_id": "VCID-64x5-tgkj-9qb9",
            "summary": "jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java in Apache Santuario XML Security for Java 1.4.x before 1.4.8 and 1.5.x before 1.5.5 allows context-dependent attackers to spoof an XML Signature by using the CanonicalizationMethod parameter to specify an arbitrary weak \"canonicalization algorithm to apply to the SignedInfo part of the Signature.\"",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1207.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1207.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1208.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1208.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1209.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1209.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1217.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1217.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1218.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1218.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1219.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1219.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1220.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1220.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1375.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1375.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1437.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1853.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1853.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0212.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-0212.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2172.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-2172.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90081",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90152",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90153",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90137",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90141",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90123",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90129",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9013",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90121",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90115",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.901",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90095",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05394",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90084",
                            "published_at": "2026-04-02T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-2172"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-2172"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2172"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2014/Dec/23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2014/Dec/23"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/25e0e11493b061749f778030036cb5c406b34590",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/25e0e11493b061749f778030036cb5c406b34590"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/8e8f8bf92a43608d7d5f9e357fae19244454a61f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/8e8f8bf92a43608d7d5f9e357fae19244454a61f"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3@%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3@%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3%40%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd%40%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-2172"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc/santuario/xml-security-java/branches/1.5.x-fixes/src/main/java/org/apache/jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java?r1=1353876&r2=1493772&pathrev=1493772&diff_format=h",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://svn.apache.org/viewvc/santuario/xml-security-java/branches/1.5.x-fixes/src/main/java/org/apache/jcp/xml/dsig/internal/dom/DOMCanonicalizationMethod.java?r1=1353876&r2=1493772&pathrev=1493772&diff_format=h"
                },
                {
                    "reference_url": "https://web.archive.org/web/20160317145515/http://www.securityfocus.com/archive/1/534161/100/0/threaded",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20160317145515/http://www.securityfocus.com/archive/1/534161/100/0/threaded"
                },
                {
                    "reference_url": "https://web.archive.org/web/20200228060314/http://www.securityfocus.com/bid/60846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://web.archive.org/web/20200228060314/http://www.securityfocus.com/bid/60846"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-3065",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.debian.org/security/2014/dsa-3065"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2028-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2028-1"
                },
                {
                    "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720375",
                    "reference_id": "720375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720375"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=999263",
                    "reference_id": "999263",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=999263"
                },
                {
                    "reference_url": "http://santuario.apache.org/secadv.data/CVE-2013-2172.txt.asc",
                    "reference_id": "CVE-2013-2172.TXT.ASC",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://santuario.apache.org/secadv.data/CVE-2013-2172.txt.asc"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r237-w2w6-jq3p",
                    "reference_id": "GHSA-r237-w2w6-jq3p",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r237-w2w6-jq3p"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1207",
                    "reference_id": "RHSA-2013:1207",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1207"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1208",
                    "reference_id": "RHSA-2013:1208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1209",
                    "reference_id": "RHSA-2013:1209",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1209"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1217",
                    "reference_id": "RHSA-2013:1217",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1217"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1218",
                    "reference_id": "RHSA-2013:1218",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1218"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1219",
                    "reference_id": "RHSA-2013:1219",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1219"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1220",
                    "reference_id": "RHSA-2013:1220",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1220"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1375",
                    "reference_id": "RHSA-2013:1375",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1375"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1437",
                    "reference_id": "RHSA-2013:1437",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1437"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1853",
                    "reference_id": "RHSA-2013:1853",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1853"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0212",
                    "reference_id": "RHSA-2014:0212",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0212"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0400",
                    "reference_id": "RHSA-2014:0400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0400"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1369",
                    "reference_id": "RHSA-2014:1369",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1369"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2028-1/",
                    "reference_id": "USN-2028-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2028-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929185?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@1.5.5-2?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@1.5.5-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929186?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.0.10-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-degg-m3tz-9ubj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.0.10-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929184?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.7-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.7-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929187?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.8-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-2172",
                "GHSA-r237-w2w6-jq3p"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-64x5-tgkj-9qb9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4628?format=api",
            "vulnerability_id": "VCID-h8wa-77tk-m3av",
            "summary": "Apache Santuario XML Security for Java before 1.5.6, when applying Transforms, allows remote attackers to cause a denial of service (memory consumption) via crafted Document Type Definitions (DTDs), related to signatures.",
            "references": [
                {
                    "reference_url": "http://packetstormsecurity.com/files/124554/Java-XML-Signature-Denial-Of-Service-Attack.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://packetstormsecurity.com/files/124554/Java-XML-Signature-Denial-Of-Service-Attack.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0170.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-0170.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0171.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-0171.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0172.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-0172.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0195.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-0195.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1725.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1725.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1726.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1726.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1727.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1727.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1728.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1728.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0850.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0851.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4517.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4517.json"
                },
                {
                    "reference_url": "http://santuario.apache.org/secadv.data/cve-2013-4517.txt.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://santuario.apache.org/secadv.data/cve-2013-4517.txt.asc"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.08392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92338",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.08392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92337",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.08392",
                            "scoring_system": "epss",
                            "scoring_elements": "0.92333",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94521",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94529",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94531",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94541",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94545",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94548",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9455",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94563",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94567",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.14926",
                            "scoring_system": "epss",
                            "scoring_elements": "0.94514",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4517"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4517"
                },
                {
                    "reference_url": "http://seclists.org/fulldisclosure/2013/Dec/169",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/fulldisclosure/2013/Dec/169"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89891",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89891"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/a09b9042f7759d094f2d49f40fc7bcf145164b25",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/a09b9042f7759d094f2d49f40fc7bcf145164b25"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3@%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3@%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4517",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4517"
                },
                {
                    "reference_url": "https://www.tenable.com/security/tns-2018-15",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.tenable.com/security/tns-2018-15"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1045257",
                    "reference_id": "1045257",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1045257"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733938",
                    "reference_id": "733938",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733938"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/CVE-2013-4517",
                    "reference_id": "CVE-2013-4517",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/CVE-2013-4517"
                },
                {
                    "reference_url": "https://cwiki.apache.org/confluence/download/attachments/27821224/cve-2013-4517.txt.asc",
                    "reference_id": "CVE-2013-4517.TXT.ASC",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cwiki.apache.org/confluence/download/attachments/27821224/cve-2013-4517.txt.asc"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4p4w-6h54-g885",
                    "reference_id": "GHSA-4p4w-6h54-g885",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4p4w-6h54-g885"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0170",
                    "reference_id": "RHSA-2014:0170",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0170"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0171",
                    "reference_id": "RHSA-2014:0171",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0171"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0172",
                    "reference_id": "RHSA-2014:0172",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0172"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0195",
                    "reference_id": "RHSA-2014:0195",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0195"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0400",
                    "reference_id": "RHSA-2014:0400",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0400"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0473",
                    "reference_id": "RHSA-2014:0473",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0473"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0582",
                    "reference_id": "RHSA-2014:0582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0582"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1725",
                    "reference_id": "RHSA-2014:1725",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1725"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1726",
                    "reference_id": "RHSA-2014:1726",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1726"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1727",
                    "reference_id": "RHSA-2014:1727",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1727"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1728",
                    "reference_id": "RHSA-2014:1728",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1728"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0675",
                    "reference_id": "RHSA-2015:0675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0850",
                    "reference_id": "RHSA-2015:0850",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0850"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0851",
                    "reference_id": "RHSA-2015:0851",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0851"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929188?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@1.5.6-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@1.5.6-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929186?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.0.10-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-degg-m3tz-9ubj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.0.10-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929184?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.7-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.7-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929187?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.8-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2013-4517",
                "GHSA-4p4w-6h54-g885"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h8wa-77tk-m3av"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4830?format=api",
            "vulnerability_id": "VCID-s52q-y45a-f7cw",
            "summary": "Apache Santuario XML Security for Java 2.0.x before 2.0.3 allows remote attackers to bypass the streaming XML signature protection mechanism via a crafted XML document.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8152.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8152.json"
                },
                {
                    "reference_url": "http://santuario.apache.org/secadv.data/CVE-2014-8152.txt.asc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://santuario.apache.org/secadv.data/CVE-2014-8152.txt.asc"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84054",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84028",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84027",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84025",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84001",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84004",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83933",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83995",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83962",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83947",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8401",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02084",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84061",
                            "published_at": "2026-04-26T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8152"
                },
                {
                    "reference_url": "http://seclists.org/oss-sec/2015/q1/181",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://seclists.org/oss-sec/2015/q1/181"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/99993"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/55857fd4cdfdb1af4069170ecdac448c078f544e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/55857fd4cdfdb1af4069170ecdac448c078f544e"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3@%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/680e6938b6412e26d5446054fd31de2011d33af11786b989127d1cc3@%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r1c07a561426ec5579073046ad7f4207cdcef452bb3100abaf908e0cd@%3Ccommits.santuario.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8152",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-8152"
                },
                {
                    "reference_url": "https://svn.apache.org/viewvc?view=revision&revision=1634334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://svn.apache.org/viewvc?view=revision&revision=1634334"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=1634334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://svn.apache.org/viewvc?view=revision&revision=1634334"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184115",
                    "reference_id": "1184115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184115"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/CVE-2014-8152",
                    "reference_id": "CVE-2014-8152",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/CVE-2014-8152"
                },
                {
                    "reference_url": "http://santuario.apache.org/secadv.data/CVE-2014-8152.txt",
                    "reference_id": "CVE-2014-8152.TXT",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://santuario.apache.org/secadv.data/CVE-2014-8152.txt"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-w7cq-j9p9-hm3m",
                    "reference_id": "GHSA-w7cq-j9p9-hm3m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-w7cq-j9p9-hm3m"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929189?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@0?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@0%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929186?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.0.10-2%2Bdeb11u1?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-degg-m3tz-9ubj"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.0.10-2%252Bdeb11u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929184?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.7-3?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.7-3%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/929187?format=api",
                    "purl": "pkg:deb/debian/libxml-security-java@2.1.8-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.1.8-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2014-8152",
                "GHSA-w7cq-j9p9-hm3m"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-s52q-y45a-f7cw"
        }
    ],
    "risk_score": "3.1",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/libxml-security-java@2.0.10-2%252Bdeb11u1%3Fdistro=trixie"
}