Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/178275?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/178275?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.1", "type": "nuget", "namespace": "", "name": "Microsoft.AspNetCore.Mvc.TagHelpers", "version": "1.0.1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "1.0.4", "latest_non_vulnerable_version": "1.1.3", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7941?format=api", "vulnerability_id": "VCID-axvm-3dh9-3kf6", "summary": "Improper Input Validation\nA denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0247", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.9344", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93448", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93449", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93457", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.9346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93466", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93491", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93501", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93431", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0247" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx" }, { "reference_url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0247", "reference_id": "CVE-2017-0247", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0247" }, { "reference_url": "https://github.com/advisories/GHSA-6xh7-4v2w-36q6", "reference_id": "GHSA-6xh7-4v2w-36q6", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-6xh7-4v2w-36q6" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/31327?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/31329?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.1.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.1.3" } ], "aliases": [ "CVE-2017-0247", "GHSA-6xh7-4v2w-36q6" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-axvm-3dh9-3kf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7939?format=api", "vulnerability_id": "VCID-b2mg-kc6t-z7ht", "summary": "Improper Input Validation\nA spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88977", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88946", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88945", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88958", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88956", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8897", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8894", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0256" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0256", "reference_id": "CVE-2017-0256", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0256" }, { "reference_url": "https://github.com/advisories/GHSA-j8f4-2w4p-mhjc", "reference_id": "GHSA-j8f4-2w4p-mhjc", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-j8f4-2w4p-mhjc" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/31327?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/31329?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.1.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.1.3" } ], "aliases": [ "CVE-2017-0256", "GHSA-j8f4-2w4p-mhjc" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2mg-kc6t-z7ht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9907?format=api", "vulnerability_id": "VCID-j4d8-wr24-63d3", "summary": "Improper Certificate Validation\nMicrosoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka \".NET Security Feature Bypass Vulnerability.\"", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7804", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77993", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77987", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78019", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78027", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77902", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77919", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77946", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7795", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77977", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77959", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0248" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0248", "reference_id": "CVE-2017-0248", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0248" }, { "reference_url": "https://github.com/advisories/GHSA-ch6p-4jcm-h8vh", "reference_id": "GHSA-ch6p-4jcm-h8vh", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-ch6p-4jcm-h8vh" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/31327?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/31329?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.1.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.1.3" } ], "aliases": [ "CVE-2017-0248", "GHSA-ch6p-4jcm-h8vh" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j4d8-wr24-63d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7933?format=api", "vulnerability_id": "VCID-mrpr-pw4n-bfae", "summary": "Improper Input Validation\nAn elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0249", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90519", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90477", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90489", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90502", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90496", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90513", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90511", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90459", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0249" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0249", "reference_id": "CVE-2017-0249", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0249" }, { "reference_url": "https://github.com/advisories/GHSA-qhqf-ghgh-x2m4", "reference_id": "GHSA-qhqf-ghgh-x2m4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-qhqf-ghgh-x2m4" }, { "reference_url": "https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7", "reference_id": "GHSA-wj4j-gr3f-cfh7", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/31327?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.4", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.4" }, { "url": "http://public2.vulnerablecode.io/api/packages/31329?format=api", "purl": "pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.1.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.1.3" } ], "aliases": [ "CVE-2017-0249", "GHSA-qhqf-ghgh-x2m4" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mrpr-pw4n-bfae" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc.TagHelpers@1.0.1" }