{"url":"http://public2.vulnerablecode.io/api/packages/143400?format=json","purl":"pkg:maven/org.springframework/spring-core@1.1.0","type":"maven","namespace":"org.springframework","name":"spring-core","version":"1.1.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"5.2.24.RELEASE","latest_non_vulnerable_version":"6.2.11","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6666?format=json","vulnerability_id":"VCID-7gb3-6gxd-73f2","summary":"Regular expression denial of service (ReDOS)\nAlgorithmic complexity vulnerability in this package allows remote attackers to cause a denial of service (CPU consumption) via serializable data with a long regex string containing multiple optional groups, a related issue to CVE-2004-2540.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1190.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1190.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1190","reference_id":"","reference_type":"","scores":[{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80361","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80275","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80305","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80307","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80337","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80343","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80224","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.8024","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80268","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80297","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01381","scoring_system":"epss","scoring_elements":"0.80281","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1190"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=497161","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=497161"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/50083","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/50083"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1190","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1190"},{"reference_url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1190","reference_id":"","reference_type":"","scores":[],"url":"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-1190"},{"reference_url":"http://www.packetstormsecurity.org/hitb06/DAY_1_-_Marc_Schoenefeld_-_Pentesting_Java_J2EE.pdf","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.packetstormsecurity.org/hitb06/DAY_1_-_Marc_Schoenefeld_-_Pentesting_Java_J2EE.pdf"},{"reference_url":"http://www.springsource.com/securityadvisory","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.springsource.com/securityadvisory"},{"reference_url":"http://support.springsource.com/security/cve-2009-1190","reference_id":"CVE-2009-1190","reference_type":"","scores":[],"url":"http://support.springsource.com/security/cve-2009-1190"},{"reference_url":"https://github.com/advisories/GHSA-wjjr-h4wh-w6vv","reference_id":"GHSA-wjjr-h4wh-w6vv","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-wjjr-h4wh-w6vv"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/19951?format=json","purl":"pkg:maven/org.springframework/spring-core@2.5.6.SEC01","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nff-p7we-tuax"},{"vulnerability":"VCID-3rev-eg6f-tkb7"},{"vulnerability":"VCID-6ysx-5wcw-f7b5"},{"vulnerability":"VCID-c74k-e1me-pfb2"},{"vulnerability":"VCID-cyjt-4vjn-mbc7"},{"vulnerability":"VCID-dfs4-emmn-f3eb"},{"vulnerability":"VCID-dv5y-1z97-ayhs"},{"vulnerability":"VCID-h4ys-unzb-cbhn"},{"vulnerability":"VCID-j3wr-npbv-8qcw"},{"vulnerability":"VCID-k17s-ttg2-ubgj"},{"vulnerability":"VCID-pb7f-yasx-17ag"},{"vulnerability":"VCID-w6br-v2gm-j7gr"},{"vulnerability":"VCID-y3uz-etva-sufh"},{"vulnerability":"VCID-z3th-j593-m7bg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@2.5.6.SEC01"},{"url":"http://public2.vulnerablecode.io/api/packages/82633?format=json","purl":"pkg:maven/org.springframework/spring-core@3.0.0.RELEASE","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nff-p7we-tuax"},{"vulnerability":"VCID-3rev-eg6f-tkb7"},{"vulnerability":"VCID-53gt-nbgk-hyc2"},{"vulnerability":"VCID-6ysx-5wcw-f7b5"},{"vulnerability":"VCID-c74k-e1me-pfb2"},{"vulnerability":"VCID-cyjt-4vjn-mbc7"},{"vulnerability":"VCID-dfs4-emmn-f3eb"},{"vulnerability":"VCID-dv5y-1z97-ayhs"},{"vulnerability":"VCID-h4ys-unzb-cbhn"},{"vulnerability":"VCID-j3wr-npbv-8qcw"},{"vulnerability":"VCID-k17s-ttg2-ubgj"},{"vulnerability":"VCID-pb7f-yasx-17ag"},{"vulnerability":"VCID-sy5j-6rkg-n3b7"},{"vulnerability":"VCID-w6br-v2gm-j7gr"},{"vulnerability":"VCID-y3uz-etva-sufh"},{"vulnerability":"VCID-z3th-j593-m7bg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@3.0.0.RELEASE"},{"url":"http://public2.vulnerablecode.io/api/packages/19952?format=json","purl":"pkg:maven/org.springframework/spring-core@3.0.1.RELEASE","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-2nff-p7we-tuax"},{"vulnerability":"VCID-3rev-eg6f-tkb7"},{"vulnerability":"VCID-53gt-nbgk-hyc2"},{"vulnerability":"VCID-6ysx-5wcw-f7b5"},{"vulnerability":"VCID-c74k-e1me-pfb2"},{"vulnerability":"VCID-cyjt-4vjn-mbc7"},{"vulnerability":"VCID-dfs4-emmn-f3eb"},{"vulnerability":"VCID-dv5y-1z97-ayhs"},{"vulnerability":"VCID-h4ys-unzb-cbhn"},{"vulnerability":"VCID-j3wr-npbv-8qcw"},{"vulnerability":"VCID-k17s-ttg2-ubgj"},{"vulnerability":"VCID-pb7f-yasx-17ag"},{"vulnerability":"VCID-sy5j-6rkg-n3b7"},{"vulnerability":"VCID-w6br-v2gm-j7gr"},{"vulnerability":"VCID-y3uz-etva-sufh"},{"vulnerability":"VCID-z3th-j593-m7bg"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@3.0.1.RELEASE"}],"aliases":["CVE-2009-1190","GHSA-wjjr-h4wh-w6vv"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7gb3-6gxd-73f2"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:maven/org.springframework/spring-core@1.1.0"}