Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/353700?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/353700?format=api", "vulnerability_id": "VCID-vk3a-td8w-ebfp", "summary": "http.cookies.Morsel.js_output() returns an inline <script> snippet and only escapes \" for JavaScript string context. It does not neutralize the HTML parser-sensitive sequence </script> inside the generated script element. Mitigation base64-encodes the cookie value to disallow escaping using cookie value.", "aliases": [ { "alias": "CVE-2026-6019" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1103668?format=api", "purl": "pkg:deb/debian/python3.14@3.14.5~rc1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.14@3.14.5~rc1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1103052?format=api", "purl": "pkg:deb/debian/python3.14@3.14.5~rc1-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.14@3.14.5~rc1-1%3Fdistro=sid" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077804?format=api", "purl": "pkg:deb/debian/python3.14@3.14.4-2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-rcu5-gpmt-r7cb" }, { "vulnerability": "VCID-vk3a-td8w-ebfp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.14@3.14.4-2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076119?format=api", "purl": "pkg:deb/debian/python3.14@3.14.4-2?distro=sid", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-rcu5-gpmt-r7cb" }, { "vulnerability": "VCID-vk3a-td8w-ebfp" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/python3.14@3.14.4-2%3Fdistro=sid" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6019.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-6019.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-6019", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11642", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11602", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00051", "scoring_system": "epss", "scoring_elements": "0.1577", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18741", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18657", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-6019" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6019", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6019" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135116", "reference_id": "1135116", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1135116" }, { "reference_url": "https://github.com/python/cpython/pull/148848", "reference_id": "148848", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/" } ], "url": "https://github.com/python/cpython/pull/148848" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460869", "reference_id": "2460869", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460869" }, { "reference_url": "https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c", "reference_id": "3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/" } ], "url": "https://github.com/python/cpython/commit/3c59b8b53fc75c7f9578d16fb8201ceb43e8f76c" }, { "reference_url": "https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104", "reference_id": "76b3923d688c0efc580658476c5f525ec8735104", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/" } ], "url": "https://github.com/python/cpython/commit/76b3923d688c0efc580658476c5f525ec8735104" }, { "reference_url": "https://github.com/python/cpython/issues/90309", "reference_id": "90309", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/" } ], "url": "https://github.com/python/cpython/issues/90309" }, { "reference_url": "https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8", "reference_id": "f795e042043dfe26c42e1971d4502c1cdc4c65b8", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/" } ], "url": "https://github.com/python/cpython/commit/f795e042043dfe26c42e1971d4502c1cdc4c65b8" }, { "reference_url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/", "reference_id": "IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3", "reference_type": "", "scores": [ { "value": "2.1", "scoring_system": "cvssv4", "scoring_elements": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-22T20:02:17Z/" } ], "url": "https://mail.python.org/archives/list/security-announce@python.org/thread/IVNWGV2BBNC3RHQAFS22UP4DY56SAXX3/" } ], "weaknesses": [ { "cwe_id": 150, "name": "Improper Neutralization of Escape, Meta, or Control Sequences", "description": "The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component." }, { "cwe_id": 79, "name": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')", "description": "The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users." } ], "exploits": [], "severity_range_score": "2.1 - 6.8", "exploitability": "0.5", "weighted_severity": "6.1", "risk_score": 3.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vk3a-td8w-ebfp" }