Lookup for vulnerable packages by Package URL.

GET /api/packages/940352?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/940352?format=api",
    "purl": "pkg:deb/debian/symfony@3.4.0%2Bdfsg-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "symfony",
    "version": "3.4.0+dfsg-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "3.4.12+dfsg-1",
    "latest_non_vulnerable_version": "7.4.8+dfsg-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9724?format=api",
            "vulnerability_id": "VCID-hxhq-zdyu-dudz",
            "summary": "Attacker can read all files content on the server\nWhen a form is submitted by the user, the request handler classes of the Form component merge POST data (known as the `$_POST` array in plain PHP) and uploaded files data (known as the `$_FILES` array in plain PHP) into one array. This big array forms the data that are then bound to the form. At this stage there is no difference anymore between submitted POST data and uploaded files. A user can send a crafted HTTP request where the value of a `FileType` is sent as normal `POST` data that could be interpreted as a locale file path on the server-side (for example, `file:///etc/passwd`). If the application did not perform any additional checks about the value submitted to the `FileType`, the contents of the given file on the server could have been exposed to the attacker.",
            "references": [
                {
                    "reference_url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71741",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71772",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71723",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71654",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7166",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71678",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71651",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71691",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71702",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71726",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71709",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00686",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71735",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2403"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11385"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11406"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/form/CVE-2017-16790.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/form/CVE-2017-16790.yaml"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2017-16790.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2017-16790.yaml"
                },
                {
                    "reference_url": "https://github.com/symfony/form",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/symfony/form"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony/pull/24993",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/symfony/symfony/pull/24993"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16790"
                },
                {
                    "reference_url": "https://symfony.com/blog/cve-2017-16790-ensure-that-submitted-data-are-uploaded-files",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://symfony.com/blog/cve-2017-16790-ensure-that-submitted-data-are-uploaded-files"
                },
                {
                    "reference_url": "https://symfony.com/cve-2017-16790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://symfony.com/cve-2017-16790"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4262",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4262"
                },
                {
                    "reference_url": "http://symfony.com/blog/cve-2017-16790-ensure-that-submitted-data-are-uploaded-files",
                    "reference_id": "CVE-2017-16790-ENSURE-THAT-SUBMITTED-DATA-ARE-UPLOADED-FILES",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://symfony.com/blog/cve-2017-16790-ensure-that-submitted-data-are-uploaded-files"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-cqqh-94r6-wjrg",
                    "reference_id": "GHSA-cqqh-94r6-wjrg",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-cqqh-94r6-wjrg"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940352?format=api",
                    "purl": "pkg:deb/debian/symfony@3.4.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@3.4.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940343?format=api",
                    "purl": "pkg:deb/debian/symfony@4.4.19%2Bdfsg-2%2Bdeb11u6?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-p1dw-w76f-gbfv"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@4.4.19%252Bdfsg-2%252Bdeb11u6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940341?format=api",
                    "purl": "pkg:deb/debian/symfony@5.4.23%2Bdfsg-1%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@5.4.23%252Bdfsg-1%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940345?format=api",
                    "purl": "pkg:deb/debian/symfony@6.4.21%2Bdfsg-2%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@6.4.21%252Bdfsg-2%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940344?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.7%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.7%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000493?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.8%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-16790",
                "GHSA-cqqh-94r6-wjrg"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hxhq-zdyu-dudz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9446?format=api",
            "vulnerability_id": "VCID-mm7e-kb6c-vucx",
            "summary": "`DefaultAuthenticationSuccessHandler` or `DefaultAuthenticationFailureHandler` take the content of the `_target_path` parameter and generate a redirect response but no check is performed on the path, which could be an absolute URL to an external domain, opening redirect vulnerability. Open redirect vulnerability are not too much considered but they can be exploited for example to mount effective phishing attacks.",
            "references": [
                {
                    "reference_url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44724",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44745",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44826",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44847",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44788",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4484",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44843",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4486",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44828",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4483",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44884",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44877",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4481",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2403"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11385"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11406"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2017-16652.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2017-16652.yaml"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2017-16652.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-http/CVE-2017-16652.yaml"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2017-16652.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2017-16652.yaml"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/symfony/symfony"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony/pull/24995",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/symfony/symfony/pull/24995"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16652"
                },
                {
                    "reference_url": "https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://symfony.com/cve-2017-16652",
                    "reference_id": "CVE-2017-16652",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://symfony.com/cve-2017-16652"
                },
                {
                    "reference_url": "http://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers",
                    "reference_id": "CVE-2017-16652-OPEN-REDIRECT-VULNERABILITY-ON-SECURITY-HANDLERS",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://symfony.com/blog/cve-2017-16652-open-redirect-vulnerability-on-security-handlers"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r7p7-qr7p-2rrf",
                    "reference_id": "GHSA-r7p7-qr7p-2rrf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r7p7-qr7p-2rrf"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940352?format=api",
                    "purl": "pkg:deb/debian/symfony@3.4.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@3.4.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940343?format=api",
                    "purl": "pkg:deb/debian/symfony@4.4.19%2Bdfsg-2%2Bdeb11u6?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-p1dw-w76f-gbfv"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@4.4.19%252Bdfsg-2%252Bdeb11u6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940341?format=api",
                    "purl": "pkg:deb/debian/symfony@5.4.23%2Bdfsg-1%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@5.4.23%252Bdfsg-1%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940345?format=api",
                    "purl": "pkg:deb/debian/symfony@6.4.21%2Bdfsg-2%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@6.4.21%252Bdfsg-2%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940344?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.7%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.7%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000493?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.8%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-16652",
                "GHSA-r7p7-qr7p-2rrf"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mm7e-kb6c-vucx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9634?format=api",
            "vulnerability_id": "VCID-skth-cf6d-3ubr",
            "summary": "Cross-site Scripting\nThe debug handler in Symfony has an XSS via an array key during exception pretty printing in `ExceptionHandler.php`, as demonstrated by a `/_debugbar/open?op`=get` URI.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18343",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66228",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66219",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66097",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66138",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66165",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66133",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66182",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66195",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66214",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66201",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6617",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00504",
                            "scoring_system": "epss",
                            "scoring_elements": "0.66206",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18343"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18343",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18343"
                },
                {
                    "reference_url": "https://github.com/barryvdh/laravel-debugbar/issues/850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/barryvdh/laravel-debugbar/issues/850"
                },
                {
                    "reference_url": "https://github.com/symfony/debug/pull/7/commits/e48bda29143bd1a83001780b4a78e483822d985c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/symfony/debug/pull/7/commits/e48bda29143bd1a83001780b4a78e483822d985c"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony/issues/27987",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/symfony/symfony/issues/27987"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony/pull/23684",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/symfony/symfony/pull/23684"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sensiolabs:symfony:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18343",
                    "reference_id": "CVE-2017-18343",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "6.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18343"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940352?format=api",
                    "purl": "pkg:deb/debian/symfony@3.4.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@3.4.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940343?format=api",
                    "purl": "pkg:deb/debian/symfony@4.4.19%2Bdfsg-2%2Bdeb11u6?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-p1dw-w76f-gbfv"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@4.4.19%252Bdfsg-2%252Bdeb11u6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940341?format=api",
                    "purl": "pkg:deb/debian/symfony@5.4.23%2Bdfsg-1%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@5.4.23%252Bdfsg-1%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940345?format=api",
                    "purl": "pkg:deb/debian/symfony@6.4.21%2Bdfsg-2%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@6.4.21%252Bdfsg-2%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940344?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.7%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.7%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000493?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.8%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-18343"
            ],
            "risk_score": 2.8,
            "exploitability": "0.5",
            "weighted_severity": "5.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-skth-cf6d-3ubr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9726?format=api",
            "vulnerability_id": "VCID-t2dx-5us4-mkf1",
            "summary": "Cross-Site Request Forgery (CSRF)\nThe current implementation of CSRF protection in Symfony does not use different tokens for HTTP and HTTPS.",
            "references": [
                {
                    "reference_url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55591",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55497",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55572",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55593",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5559",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55553",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5557",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55414",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55526",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55551",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55528",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55579",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00325",
                            "scoring_system": "epss",
                            "scoring_elements": "0.55581",
                            "published_at": "2026-04-09T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16653"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2403"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11385"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11406"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-csrf/CVE-2017-16653.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security-csrf/CVE-2017-16653.yaml"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2017-16653.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2017-16653.yaml"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2017-16653.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2017-16653.yaml"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/symfony/symfony"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony/commit/b4dbdd7cd8732483d585eacff3428c16b07ad15e",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/symfony/symfony/commit/b4dbdd7cd8732483d585eacff3428c16b07ad15e"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony/pull/24992",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/symfony/symfony/pull/24992"
                },
                {
                    "reference_url": "https://symfony.com/blog/cve-2017-16653-csrf-protection-does-not-use-different-tokens-for-http-and-https",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://symfony.com/blog/cve-2017-16653-csrf-protection-does-not-use-different-tokens-for-http-and-https"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4262",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4262"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16653",
                    "reference_id": "CVE-2017-16653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16653"
                },
                {
                    "reference_url": "https://symfony.com/cve-2017-16653",
                    "reference_id": "CVE-2017-16653",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://symfony.com/cve-2017-16653"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-92x6-h2gr-8gxq",
                    "reference_id": "GHSA-92x6-h2gr-8gxq",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-92x6-h2gr-8gxq"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940352?format=api",
                    "purl": "pkg:deb/debian/symfony@3.4.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@3.4.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940343?format=api",
                    "purl": "pkg:deb/debian/symfony@4.4.19%2Bdfsg-2%2Bdeb11u6?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-p1dw-w76f-gbfv"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@4.4.19%252Bdfsg-2%252Bdeb11u6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940341?format=api",
                    "purl": "pkg:deb/debian/symfony@5.4.23%2Bdfsg-1%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@5.4.23%252Bdfsg-1%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940345?format=api",
                    "purl": "pkg:deb/debian/symfony@6.4.21%2Bdfsg-2%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@6.4.21%252Bdfsg-2%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940344?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.7%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.7%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000493?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.8%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-16653",
                "GHSA-92x6-h2gr-8gxq"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t2dx-5us4-mkf1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9723?format=api",
            "vulnerability_id": "VCID-vpsz-zhhq-xfbw",
            "summary": "An attacker can navigate to arbitrary directories via the dot-dot-slash attack\nThis package includes various bundle readers that are used to read resource bundles from the local filesystem. The `read()` methods of these classes use a path and a locale to determine the language bundle to retrieve. The locale argument value is commonly retrieved from untrusted user input (like a `URL` parameter). An attacker can use this argument to navigate to arbitrary directories via the dot-dot-slash attack.",
            "references": [
                {
                    "reference_url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67648",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67773",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67754",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67761",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67724",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67772",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67748",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67735",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67703",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00543",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67683",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-16654"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2403",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2403"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16652"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16653"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16654"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16790"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11385",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11385"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11406",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11406"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/intl/CVE-2017-16654.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/intl/CVE-2017-16654.yaml"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2017-16654.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2017-16654.yaml"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/symfony/symfony"
                },
                {
                    "reference_url": "https://github.com/symfony/symfony/pull/24994",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/symfony/symfony/pull/24994"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00009.html"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16654"
                },
                {
                    "reference_url": "https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths"
                },
                {
                    "reference_url": "https://symfony.com/cve-2017-16654",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://symfony.com/cve-2017-16654"
                },
                {
                    "reference_url": "https://www.debian.org/security/2018/dsa-4262",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.debian.org/security/2018/dsa-4262"
                },
                {
                    "reference_url": "http://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths",
                    "reference_id": "CVE-2017-16654-INTL-BUNDLE-READERS-BREAKING-OUT-OF-PATHS",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://symfony.com/blog/cve-2017-16654-intl-bundle-readers-breaking-out-of-paths"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-c49r-8gj6-768r",
                    "reference_id": "GHSA-c49r-8gj6-768r",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-c49r-8gj6-768r"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940352?format=api",
                    "purl": "pkg:deb/debian/symfony@3.4.0%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@3.4.0%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940343?format=api",
                    "purl": "pkg:deb/debian/symfony@4.4.19%2Bdfsg-2%2Bdeb11u6?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-p1dw-w76f-gbfv"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@4.4.19%252Bdfsg-2%252Bdeb11u6%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940341?format=api",
                    "purl": "pkg:deb/debian/symfony@5.4.23%2Bdfsg-1%2Bdeb12u5?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@5.4.23%252Bdfsg-1%252Bdeb12u5%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940345?format=api",
                    "purl": "pkg:deb/debian/symfony@6.4.21%2Bdfsg-2%2Bdeb13u1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@6.4.21%252Bdfsg-2%252Bdeb13u1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/940344?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.7%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.7%252Bdfsg-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1000493?format=api",
                    "purl": "pkg:deb/debian/symfony@7.4.8%2Bdfsg-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@7.4.8%252Bdfsg-1%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2017-16654",
                "GHSA-c49r-8gj6-768r"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vpsz-zhhq-xfbw"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/symfony@3.4.0%252Bdfsg-1%3Fdistro=trixie"
}