Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/5151?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5151?format=api", "vulnerability_id": "VCID-2sz2-usex-xfhd", "summary": "Microsoft Security Advisory CVE-2018-0765: .NET Core Denial Of Service Vulnerability", "aliases": [ { "alias": "CVE-2018-0765" }, { "alias": "GHSA-35hc-x2cw-2j4v" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1592?format=api", "purl": "pkg:nuget/System.Security.Cryptography.Xml@4.4.2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-rz8f-jn6b-a7fw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Security.Cryptography.Xml@4.4.2" } ], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/178551?format=api", "purl": "pkg:nuget/System.Security.Cryptography.Xml@4.4.0-preview1-25305-02", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2sz2-usex-xfhd" }, { "vulnerability": "VCID-3ba4-y4bs-eff3" }, { "vulnerability": "VCID-rz8f-jn6b-a7fw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Security.Cryptography.Xml@4.4.0-preview1-25305-02" }, { "url": "http://public2.vulnerablecode.io/api/packages/178552?format=api", "purl": "pkg:nuget/System.Security.Cryptography.Xml@4.4.0-preview2-25405-01", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2sz2-usex-xfhd" }, { "vulnerability": "VCID-3ba4-y4bs-eff3" }, { "vulnerability": "VCID-rz8f-jn6b-a7fw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Security.Cryptography.Xml@4.4.0-preview2-25405-01" }, { "url": "http://public2.vulnerablecode.io/api/packages/1593?format=api", "purl": "pkg:nuget/System.Security.Cryptography.Xml@4.4.0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2sz2-usex-xfhd" }, { "vulnerability": "VCID-3ba4-y4bs-eff3" }, { "vulnerability": "VCID-rz8f-jn6b-a7fw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Security.Cryptography.Xml@4.4.0" }, { "url": "http://public2.vulnerablecode.io/api/packages/1591?format=api", "purl": "pkg:nuget/System.Security.Cryptography.Xml@4.4.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2sz2-usex-xfhd" }, { "vulnerability": "VCID-3ba4-y4bs-eff3" }, { "vulnerability": "VCID-rz8f-jn6b-a7fw" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Security.Cryptography.Xml@4.4.1" } ], "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0765.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0765.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0765", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.93036", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.92994", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.93001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.92991", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.92993", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.9303", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.93022", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.9302", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.9301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.93009", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.93011", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.92982", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0991", "scoring_system": "epss", "scoring_elements": "0.93006", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0765" }, { "reference_url": "https://github.com/dotnet/announcements/issues/67", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/dotnet/announcements/issues/67" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0765" }, { "reference_url": "http://www.securityfocus.com/bid/104060", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/104060" }, { "reference_url": "http://www.securitytracker.com/id/1040851", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securitytracker.com/id/1040851" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576631", "reference_id": "1576631", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1576631" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_core:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_core:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_core:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:2.0:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:3.0:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:3.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0765", "reference_id": "CVE-2018-0765", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0765" }, { "reference_url": "https://github.com/advisories/GHSA-35hc-x2cw-2j4v", "reference_id": "GHSA-35hc-x2cw-2j4v", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-35hc-x2cw-2j4v" } ], "weaknesses": [ { "cwe_id": 1035, "name": "OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017." }, { "cwe_id": 611, "name": "Improper Restriction of XML External Entity Reference", "description": "The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output." }, { "cwe_id": 937, "name": "OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities", "description": "Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013." }, { "cwe_id": 20, "name": "Improper Input Validation", "description": "The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly." }, { "cwe_id": 400, "name": "Uncontrolled Resource Consumption", "description": "The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources." } ], "exploits": [], "severity_range_score": "5.0 - 8.9", "exploitability": "0.5", "weighted_severity": "8.0", "risk_score": 4.0, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2sz2-usex-xfhd" }