Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/4690?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4690?format=api", "vulnerability_id": "VCID-a9bd-d31y-k7g6", "summary": "org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL.", "aliases": [ { "alias": "CVE-2014-0033" }, { "alias": "GHSA-6gjj-c5mj-4cvp" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1383?format=api", "purl": "pkg:apache/tomcat@6.0.39", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-jf7u-dvpd-b7f4" }, { "vulnerability": "VCID-kgd1-bzst-muh7" }, { "vulnerability": "VCID-kzzv-rhya-j7dd" }, { "vulnerability": "VCID-ygvw-69am-s7ae" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@6.0.39" }, { "url": "http://public2.vulnerablecode.io/api/packages/571475?format=api", "purl": "pkg:deb/debian/tomcat6@6.0.45%2Bdfsg-1~deb7u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat6@6.0.45%252Bdfsg-1~deb7u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/84547?format=api", "purl": "pkg:ebuild/www-servers/tomcat@7.0.56", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:ebuild/www-servers/tomcat@7.0.56" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1387?format=api", "purl": "pkg:apache/tomcat@6.0.33", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-hhk9-cr54-8fgc" }, { "vulnerability": "VCID-hxj6-mupf-abbc" }, { "vulnerability": "VCID-quwu-ep21-cyew" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@6.0.33" }, { "url": "http://public2.vulnerablecode.io/api/packages/1385?format=api", "purl": "pkg:apache/tomcat@6.0.37", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-tcbc-3kgt-muam" }, { "vulnerability": "VCID-twh8-87va-juf9" }, { "vulnerability": "VCID-w82a-7kk2-p3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apache/tomcat@6.0.37" }, { "url": "http://public2.vulnerablecode.io/api/packages/571471?format=api", "purl": "pkg:deb/debian/tomcat6@6.0.16-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1k8f-vsg1-k3d6" }, { "vulnerability": "VCID-4mkw-7haq-pkgn" }, { "vulnerability": "VCID-68fk-4g86-ekbp" }, { "vulnerability": "VCID-7cpu-h5fr-8ffd" }, { "vulnerability": "VCID-9exq-fhv6-bbea" }, { "vulnerability": "VCID-a1by-zvtm-akdc" }, { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-jf7u-dvpd-b7f4" }, { "vulnerability": "VCID-kgd1-bzst-muh7" }, { "vulnerability": "VCID-kyb8-rvyw-s7b1" }, { "vulnerability": "VCID-kzzv-rhya-j7dd" }, { "vulnerability": "VCID-p4dn-y54m-8fd1" }, { "vulnerability": "VCID-p6ch-pc73-b3ck" }, { "vulnerability": "VCID-ryha-ndms-afbn" }, { "vulnerability": "VCID-tcbc-3kgt-muam" }, { "vulnerability": "VCID-tfrs-d458-tfaq" }, { "vulnerability": "VCID-vhjj-dnft-kkf4" }, { "vulnerability": "VCID-w82a-7kk2-p3f1" }, { "vulnerability": "VCID-ygvw-69am-s7ae" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat6@6.0.16-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/571472?format=api", "purl": "pkg:deb/debian/tomcat6@6.0.35-1%2Bsqueeze4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1k8f-vsg1-k3d6" }, { "vulnerability": "VCID-4mkw-7haq-pkgn" }, { "vulnerability": "VCID-68fk-4g86-ekbp" }, { "vulnerability": "VCID-7cpu-h5fr-8ffd" }, { "vulnerability": "VCID-9exq-fhv6-bbea" }, { "vulnerability": "VCID-a1by-zvtm-akdc" }, { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-jf7u-dvpd-b7f4" }, { "vulnerability": "VCID-kgd1-bzst-muh7" }, { "vulnerability": "VCID-kyb8-rvyw-s7b1" }, { "vulnerability": "VCID-kzzv-rhya-j7dd" }, { "vulnerability": "VCID-p4dn-y54m-8fd1" }, { "vulnerability": "VCID-p6ch-pc73-b3ck" }, { "vulnerability": "VCID-ryha-ndms-afbn" }, { "vulnerability": "VCID-tcbc-3kgt-muam" }, { "vulnerability": "VCID-tfrs-d458-tfaq" }, { "vulnerability": "VCID-vhjj-dnft-kkf4" }, { "vulnerability": "VCID-w82a-7kk2-p3f1" }, { "vulnerability": "VCID-ygvw-69am-s7ae" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat6@6.0.35-1%252Bsqueeze4" }, { "url": "http://public2.vulnerablecode.io/api/packages/571473?format=api", "purl": "pkg:deb/debian/tomcat6@6.0.41-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1k8f-vsg1-k3d6" }, { "vulnerability": "VCID-4mkw-7haq-pkgn" }, { "vulnerability": "VCID-68fk-4g86-ekbp" }, { "vulnerability": "VCID-7cpu-h5fr-8ffd" }, { "vulnerability": "VCID-9exq-fhv6-bbea" }, { "vulnerability": "VCID-a1by-zvtm-akdc" }, { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-jf7u-dvpd-b7f4" }, { "vulnerability": "VCID-kgd1-bzst-muh7" }, { "vulnerability": "VCID-kyb8-rvyw-s7b1" }, { "vulnerability": "VCID-kzzv-rhya-j7dd" }, { "vulnerability": "VCID-p6ch-pc73-b3ck" }, { "vulnerability": "VCID-tcbc-3kgt-muam" }, { "vulnerability": "VCID-tfrs-d458-tfaq" }, { "vulnerability": "VCID-vhjj-dnft-kkf4" }, { "vulnerability": "VCID-w82a-7kk2-p3f1" }, { "vulnerability": "VCID-ygvw-69am-s7ae" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat6@6.0.41-3" }, { "url": "http://public2.vulnerablecode.io/api/packages/571474?format=api", "purl": "pkg:deb/debian/tomcat6@6.0.45-1~deb6u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1k8f-vsg1-k3d6" }, { "vulnerability": "VCID-4mkw-7haq-pkgn" }, { "vulnerability": "VCID-68fk-4g86-ekbp" }, { "vulnerability": "VCID-7cpu-h5fr-8ffd" }, { "vulnerability": "VCID-9exq-fhv6-bbea" }, { "vulnerability": "VCID-a1by-zvtm-akdc" }, { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-jf7u-dvpd-b7f4" }, { "vulnerability": "VCID-kgd1-bzst-muh7" }, { "vulnerability": "VCID-kyb8-rvyw-s7b1" }, { "vulnerability": "VCID-kzzv-rhya-j7dd" }, { "vulnerability": "VCID-p6ch-pc73-b3ck" }, { "vulnerability": "VCID-tcbc-3kgt-muam" }, { "vulnerability": "VCID-tfrs-d458-tfaq" }, { "vulnerability": "VCID-vhjj-dnft-kkf4" }, { "vulnerability": "VCID-w82a-7kk2-p3f1" }, { "vulnerability": "VCID-ygvw-69am-s7ae" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/tomcat6@6.0.45-1~deb6u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1388?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat@6.0.33", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-hhk9-cr54-8fgc" }, { "vulnerability": "VCID-hxj6-mupf-abbc" }, { "vulnerability": "VCID-quwu-ep21-cyew" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.33" }, { "url": "http://public2.vulnerablecode.io/api/packages/1386?format=api", "purl": "pkg:maven/org.apache.tomcat/tomcat@6.0.37", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-tcbc-3kgt-muam" }, { "vulnerability": "VCID-twh8-87va-juf9" }, { "vulnerability": "VCID-w82a-7kk2-p3f1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tomcat/tomcat@6.0.37" }, { "url": "http://public2.vulnerablecode.io/api/packages/122885?format=api", "purl": "pkg:rpm/redhat/tomcat6@6.0.37-19_patch_04.ep6?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-gv12-4ruf-kfhq" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-tcbc-3kgt-muam" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat6@6.0.37-19_patch_04.ep6%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/122883?format=api", "purl": "pkg:rpm/redhat/tomcat6@6.0.37-27_patch_04.ep6?arch=el6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-a9bd-d31y-k7g6" }, { "vulnerability": "VCID-gv12-4ruf-kfhq" }, { "vulnerability": "VCID-h9ds-trhx-m7aj" }, { "vulnerability": "VCID-tcbc-3kgt-muam" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat6@6.0.37-27_patch_04.ep6%3Farch=el6" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0033.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0033.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0033", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94782", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94828", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94825", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94818", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94817", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94814", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.9481", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94806", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94795", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.16231", "scoring_system": "epss", "scoring_elements": "0.94792", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-0033" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069919", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1069919" }, { "reference_url": "http://seclists.org/fulldisclosure/2014/Dec/23", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://seclists.org/fulldisclosure/2014/Dec/23" }, { "reference_url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://svn.apache.org/viewvc?view=rev&rev=1558822", "reference_id": "", "reference_type": "", "scores": [], "url": "https://svn.apache.org/viewvc?view=rev&rev=1558822" }, { "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=1558822", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://svn.apache.org/viewvc?view=revision&revision=1558822" }, { "reference_url": "http://tomcat.apache.org/security-6.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://tomcat.apache.org/security-6.html" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21675886" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21677147" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21678231" }, { "reference_url": "http://www.debian.org/security/2016/dsa-3530", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.debian.org/security/2016/dsa-3530" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2130-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ubuntu.com/usn/USN-2130-1" }, { "reference_url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.vmware.com/security/advisories/VMSA-2014-0012.html" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0033", "reference_id": "CVE-2014-0033", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "apache_tomcat", "scoring_elements": "" } ], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0033" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0033", "reference_id": "CVE-2014-0033", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0033" }, { "reference_url": "https://github.com/advisories/GHSA-6gjj-c5mj-4cvp", "reference_id": "GHSA-6gjj-c5mj-4cvp", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-6gjj-c5mj-4cvp" }, { "reference_url": "https://security.gentoo.org/glsa/201412-29", "reference_id": "GLSA-201412-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201412-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0525", "reference_id": "RHSA-2014:0525", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0525" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0528", "reference_id": "RHSA-2014:0528", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:0528" }, { "reference_url": "https://usn.ubuntu.com/2130-1/", "reference_id": "USN-2130-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2130-1/" } ], "weaknesses": [ { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 20, "name": "Improper Input Validation", "description": "The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 384, "name": "Session Fixation", "description": "Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions." } ], "exploits": [], "severity_range_score": "0.1 - 6.9", "exploitability": "0.5", "weighted_severity": "6.2", "risk_score": 3.1, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9bd-d31y-k7g6" }