Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1612?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1612?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4", "type": "nuget", "namespace": "", "name": "Microsoft.AspNetCore.Mvc.Cors", "version": "1.0.4", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "1.0.6", "latest_non_vulnerable_version": "1.1.6", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5152?format=api", "vulnerability_id": "VCID-bmf7-rsbm-3fb1", "summary": "Microsoft Security Advisory CVE-2017-8700: CORS bypass can enable Information Disclosure", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8700.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-8700.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8700", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07387", "scoring_system": "epss", "scoring_elements": "0.91771", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.07387", "scoring_system": "epss", "scoring_elements": "0.91759", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.07387", "scoring_system": "epss", "scoring_elements": "0.91746", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.07387", "scoring_system": "epss", "scoring_elements": "0.91748", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.07533", "scoring_system": "epss", "scoring_elements": "0.91831", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07533", "scoring_system": "epss", "scoring_elements": "0.91837", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.10872", "scoring_system": "epss", "scoring_elements": "0.93361", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10872", "scoring_system": "epss", "scoring_elements": "0.93347", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10872", "scoring_system": "epss", "scoring_elements": "0.93355", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10872", "scoring_system": "epss", "scoring_elements": "0.93362", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11016", "scoring_system": "epss", "scoring_elements": "0.93424", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11016", "scoring_system": "epss", "scoring_elements": "0.9343", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11016", "scoring_system": "epss", "scoring_elements": "0.9342", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11016", "scoring_system": "epss", "scoring_elements": "0.93429", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-8700" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/279", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/279" }, { "reference_url": "https://github.com/github/advisory-database/issues/302", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/github/advisory-database/issues/302" }, { "reference_url": "http://www.securityfocus.com/bid/101712", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101712" }, { "reference_url": "http://www.securitytracker.com/id/1039793", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039793" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512998", "reference_id": "1512998", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1512998" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:asp.net_core:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:asp.net_core:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:microsoft:asp.net_core:2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8700", "reference_id": "CVE-2017-8700", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-8700" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8700", "reference_id": "CVE-2017-8700", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8700" }, { "reference_url": "https://github.com/advisories/GHSA-3rp6-rjw4-cq39", "reference_id": "GHSA-3rp6-rjw4-cq39", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-3rp6-rjw4-cq39" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1608?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.6" }, { "url": "http://public2.vulnerablecode.io/api/packages/1615?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.5" }, { "url": "http://public2.vulnerablecode.io/api/packages/52898?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.6", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.6" } ], "aliases": [ "CVE-2017-8700", "GHSA-3rp6-rjw4-cq39" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bmf7-rsbm-3fb1" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7941?format=api", "vulnerability_id": "VCID-axvm-3dh9-3kf6", "summary": "Improper Input Validation\nA denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0247", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93519", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93449", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93457", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.9346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93466", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93491", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93501", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93506", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93431", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.9344", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93448", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0247" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx" }, { "reference_url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0247", "reference_id": "CVE-2017-0247", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0247" }, { "reference_url": "https://github.com/advisories/GHSA-6xh7-4v2w-36q6", "reference_id": "GHSA-6xh7-4v2w-36q6", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-6xh7-4v2w-36q6" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1612?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1618?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.3" } ], "aliases": [ "CVE-2017-0247", "GHSA-6xh7-4v2w-36q6" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-axvm-3dh9-3kf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7939?format=api", "vulnerability_id": "VCID-b2mg-kc6t-z7ht", "summary": "Improper Input Validation\nA spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88998", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88945", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88958", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88956", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8897", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88977", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88946", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0256" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0256", "reference_id": "CVE-2017-0256", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0256" }, { "reference_url": "https://github.com/advisories/GHSA-j8f4-2w4p-mhjc", "reference_id": "GHSA-j8f4-2w4p-mhjc", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-j8f4-2w4p-mhjc" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1612?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1618?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.3" } ], "aliases": [ "CVE-2017-0256", "GHSA-j8f4-2w4p-mhjc" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2mg-kc6t-z7ht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9907?format=api", "vulnerability_id": "VCID-j4d8-wr24-63d3", "summary": "Improper Certificate Validation\nMicrosoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka \".NET Security Feature Bypass Vulnerability.\"", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78076", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77987", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78019", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78027", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7804", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7805", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77902", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77919", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77946", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7795", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77977", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77993", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0248" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0248", "reference_id": "CVE-2017-0248", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0248" }, { "reference_url": "https://github.com/advisories/GHSA-ch6p-4jcm-h8vh", "reference_id": "GHSA-ch6p-4jcm-h8vh", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-ch6p-4jcm-h8vh" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1612?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1618?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.3" } ], "aliases": [ "CVE-2017-0248", "GHSA-ch6p-4jcm-h8vh" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j4d8-wr24-63d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7933?format=api", "vulnerability_id": "VCID-mrpr-pw4n-bfae", "summary": "Improper Input Validation\nAn elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0249", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90549", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90489", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90502", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90496", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90513", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90511", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90519", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90531", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90477", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0249" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0249", "reference_id": "CVE-2017-0249", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0249" }, { "reference_url": "https://github.com/advisories/GHSA-qhqf-ghgh-x2m4", "reference_id": "GHSA-qhqf-ghgh-x2m4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-qhqf-ghgh-x2m4" }, { "reference_url": "https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7", "reference_id": "GHSA-wj4j-gr3f-cfh7", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1612?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/1618?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bmf7-rsbm-3fb1" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.1.3" } ], "aliases": [ "CVE-2017-0249", "GHSA-qhqf-ghgh-x2m4" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mrpr-pw4n-bfae" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.Cors@1.0.4" }