Lookup for vulnerable packages by Package URL.

GET /api/packages/216553?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/216553?format=api",
    "purl": "pkg:composer/typo3fluid/fluid@2.0.1",
    "type": "composer",
    "namespace": "typo3fluid",
    "name": "fluid",
    "version": "2.0.1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "2.0.8",
    "latest_non_vulnerable_version": "2.6.10",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33449?format=api",
            "vulnerability_id": "VCID-4qmp-u7bf-mfef",
            "summary": "Cross-Site Scripting through Fluid view helper arguments\n> ### Meta\n> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)\n> * CWE-79\n\n### Problem\n\nThree XSS vulnerabilities have been detected in Fluid:\n\n1. TagBasedViewHelper allowed XSS throug maliciously crafted `additionalAttributes` arrays by creating keys with attribute-closing quotes followed by HTML. When rendering such attributes, TagBuilder would not escape the keys.\n2. ViewHelpers which used the `CompileWithContentArgumentAndRenderStatic` trait, and which declared `escapeOutput = false`, would receive the content argument in unescaped format.\n3. Subclasses of AbstractConditionViewHelper would receive the `then` and `else` arguments in unescaped format.\n\n### Solution\nUpdate to versions 2.0.8, 2.1.7, 2.2.4, 2.3.7, 2.4.4, 2.5.11 or 2.6.10 of this `typo3fluid/fluid` package that fix the problem described.\n\nUpdated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:\n\n* TYPO3 v9.5.23 (using typo3fluid/fluid v2.6.10)\n* TYPO3 v10.4.10 (using typo3fluid/fluid v2.6.10)\n\nThe specific vulnerabilities are prevented by:\n\n1. Explicitly escaping keys found in the `additionalAttributes` array passed to a TagBasedViewHelper before using them as attribute names.\n2. Detecting \"content argument\" on ViewHelpers using the trait CompileWithContentArgumentAndRenderStatic and escaping it based on the state of `escapeChildren` when `escapeOutput` is toggled off. Escaping still will not occur if explicitly disabled by an enclosing ViewHelper. This homogenises escaping behavior of \"content arguments\" so the same strategy is used whether the \"content\" argument is passed as argument or child content.\n3. Explicitly defining the `then` and `else` arguments on AbstractConditionViewHelper subclasses as escaped and applying escaping in all cases where escaping is not explicitly disabled by an enclosing ViewHelper.\n\n\n### Affected cases\n\n1. The fix for TagBasedViewHelper does not affect any valid use cases; it only prevents use of maliciously crafted attribute/value arrays passed as `additionalAttributes`.\n2. Any case where a ViewHelper with a \"content argument\" and which defines `escapeOutput = false` is used with the content argument instead of passing variables as child node - e.g. `<v:h content=\"{variable}\" />` instead of `<v:h>{variable}</v:h>` to intentionally circumvent escaping of any HTML in `{variable}`.\n3. Any case where a condition ViewHelper is used with `then` or `else` arguments to render a variable containing HTML, excluding cases where the variable is intentionally unescaped - e.g. `<f:if condition=\"1\" then=\"{variable -> f:format.raw()}\" />`, and excluding any cases where a ViewHelper is used as argument value and the ViewHelper intentionally disables escaping - e.g. `<f:if condition=\"1\" then=\"{f:render(section: 'MySection')}\" />` does not escape the `then` argument because `f:render` disables output escaping.\n\nCases 2 and 3 can be mitigated to allow variables with HTML to not be escaped, by intentionally disabling escaping by chaining the variable used in the argument with `f:format.raw` as described in case 3. Note that this constitutes a potential security issue, for which the template author is solely responsible. Example: `<f:if condition=\"1\" then=\"{intentionalHtmlVariable}\" />` can allow HTML in `{intentionalHtmlVariable}` by adding `-> f:format.raw()` - to become `<f:if condition=\"1\" then=\"{intentionalHtmlVariable -> f:format.raw()}\" />`.\n\nCustom ViewHelpers which use `CompileWithContentArgumentAndRenderStatic` can alternatively pass a 6th argument with value `false` to the call to `registerArgument` which registers the \"content argument\", which explicitly disables escaping of the argument value: `$this->registerArgument('arg', 'string', 'My argument', false, null, false);`. Note that this constitutes a potential security issue for which the ViewHelper author is solely responsible. **Variables containing HTML should only be allowed after taking great care to prevent XSS through other means, e.g. sanitising the variable before it is assigned to Fluid or only allowing such variables to come from trusted sources.**\n\n### Credits\nThanks to Jonas Eberle and Sinan Sekerci (Dreamlab Technologies) who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.\n\n### References\n* [TYPO3-CORE-SA-2020-009](https://typo3.org/security/advisory/typo3-core-sa-2020-009)",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69139",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6899",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69009",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69032",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69018",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68989",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69029",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69038",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69069",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69076",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69083",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69064",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69106",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68923",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6894",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00583",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6896",
                            "published_at": "2026-04-04T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-26216"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3fluid/fluid/CVE-2020-26216.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3fluid/fluid/CVE-2020-26216.yaml"
                },
                {
                    "reference_url": "https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/TYPO3/Fluid/commit/f20db4e74cf9803c6cffca2ed2f03e1b0b89d0dc"
                },
                {
                    "reference_url": "https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/TYPO3/Fluid/security/advisories/GHSA-hpjm-3ww5-6cpf"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26216",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-26216"
                },
                {
                    "reference_url": "https://typo3.org/security/advisory/typo3-core-sa-2020-009",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.0",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://typo3.org/security/advisory/typo3-core-sa-2020-009"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-hpjm-3ww5-6cpf",
                    "reference_id": "GHSA-hpjm-3ww5-6cpf",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-hpjm-3ww5-6cpf"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73250?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.0.8",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.0.8"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73251?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.1.7",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.1.7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73252?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.2.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.2.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73253?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.3.7",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.3.7"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73254?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.4.4",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.4.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73255?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.5.11",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.5.11"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/73256?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.6.10",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.6.10"
                }
            ],
            "aliases": [
                "CVE-2020-26216",
                "GHSA-hpjm-3ww5-6cpf"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qmp-u7bf-mfef"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/32405?format=api",
            "vulnerability_id": "VCID-f1rq-qudk-zkf2",
            "summary": "Cross-Site Scripting in ternary conditional operator\n> ### Meta\n> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0)\n> * CWE-79\n\n---\n\n:information_source: &nbsp;This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020\n\n---\n\n### Problem\nIt has been discovered that the Fluid Engine (package `typo3fluid/fluid`) is vulnerable to cross-site scripting when making use of the ternary conditional operator in templates like the following.\n\n```\n{showFullName ? fullName : defaultValue}\n```\n\n### Solution\nUpdate to versions 2.0.5, 2.1.4, 2.2.1, 2.3.5, 2.4.1, 2.5.5 or 2.6.1 of this `typo3fluid/fluid` package that fix the problem described.\n\nUpdated versions of this package are bundled in following TYPO3 (`typo3/cms-core`) releases:\n* TYPO3 v8.7.25 (using `typo3fluid/fluid` v2.5.5)\n* TYPO3 v9.5.6 (using `typo3fluid/fluid` v2.6.1)\n\n### Credits\nThanks to Bill Dagou who reported this issue and to TYPO3 core merger Claus Due who fixed the issue.\n\n### References\n* [TYPO3-CORE-SA-2019-013](https://typo3.org/security/advisory/typo3-core-sa-2019-013)",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56865",
                            "published_at": "2026-05-09T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56744",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56838",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56859",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56836",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56887",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5689",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56899",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56879",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56856",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56886",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56883",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5686",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56801",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56818",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56802",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56756",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00341",
                            "scoring_system": "epss",
                            "scoring_elements": "0.56803",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15241"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-15241.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms-core/CVE-2020-15241.yaml"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-15241.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/CVE-2020-15241.yaml"
                },
                {
                    "reference_url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3fluid/fluid/CVE-2020-15241.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3fluid/fluid/CVE-2020-15241.yaml"
                },
                {
                    "reference_url": "https://github.com/TYPO3/Fluid",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/TYPO3/Fluid"
                },
                {
                    "reference_url": "https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d"
                },
                {
                    "reference_url": "https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15241",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-15241"
                },
                {
                    "reference_url": "https://typo3.org/security/advisory/typo3-core-sa-2019-013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://typo3.org/security/advisory/typo3-core-sa-2019-013"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7733-hjv6-4h47",
                    "reference_id": "GHSA-7733-hjv6-4h47",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7733-hjv6-4h47"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72634?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.0.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4qmp-u7bf-mfef"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.0.5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72635?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.1.4",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4qmp-u7bf-mfef"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.1.4"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72636?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.2.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4qmp-u7bf-mfef"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.2.1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72637?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.3.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4qmp-u7bf-mfef"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.3.5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72638?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.4.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4qmp-u7bf-mfef"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.4.1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72639?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.5.5",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4qmp-u7bf-mfef"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.5.5"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/72640?format=api",
                    "purl": "pkg:composer/typo3fluid/fluid@2.6.1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-4qmp-u7bf-mfef"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.6.1"
                }
            ],
            "aliases": [
                "CVE-2020-15241",
                "GHSA-7733-hjv6-4h47"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f1rq-qudk-zkf2"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:composer/typo3fluid/fluid@2.0.1"
}