Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/31143?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/31143?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.0.1", "type": "nuget", "namespace": "", "name": "System.Text.Encodings.Web", "version": "4.0.1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "4.5.1", "latest_non_vulnerable_version": "5.0.1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34615?format=api", "vulnerability_id": "VCID-bd3c-1sg9-wfh2", "summary": ".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.\n\n### Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed.\n\n### Discussion\n\nDiscussion for this issue can be found at dotnet/runtime#49377\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n### Affected software\n\nThe vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability.\n\nVulnerable package versions:\n\nAny .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below.\n\nPackage Name | Vulnerable Versions | Secure Versions\n-|-|-\nSystem.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1\nSystem.Text.Encodings.Web | 4.6.0-4.7.1 | 4.7.2\nSystem.Text.Encodings.Web | 5.0.0 | 5.0.1\n\n\nPlease validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26701.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26701.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26701", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.86069", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.86019", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.86056", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.86059", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.86042", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.86", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.85999", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.8599", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.85971", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.8598", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.85976", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.85958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.85963", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.85965", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02731", "scoring_system": "epss", "scoring_elements": "0.8595", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02772", "scoring_system": "epss", "scoring_elements": "0.86003", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0295", "scoring_system": "epss", "scoring_elements": "0.86444", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02994", "scoring_system": "epss", "scoring_elements": "0.8649", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02994", "scoring_system": "epss", "scoring_elements": "0.865", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-26701" }, { "reference_url": "https://github.com/dotnet/announcements/issues/178", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/dotnet/announcements/issues/178" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26701", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26701" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933740", "reference_id": "1933740", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1933740" }, { "reference_url": "https://security.archlinux.org/ASA-202103-20", "reference_id": "ASA-202103-20", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202103-20" }, { "reference_url": "https://security.archlinux.org/ASA-202103-21", "reference_id": "ASA-202103-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202103-21" }, { "reference_url": "https://security.archlinux.org/AVG-1698", "reference_id": "AVG-1698", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1698" }, { "reference_url": "https://github.com/advisories/GHSA-ghhp-997w-qr28", "reference_id": "GHSA-ghhp-997w-qr28", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-ghhp-997w-qr28" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0787", "reference_id": "RHSA-2021:0787", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0788", "reference_id": "RHSA-2021:0788", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0788" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0789", "reference_id": "RHSA-2021:0789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0790", "reference_id": "RHSA-2021:0790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0793", "reference_id": "RHSA-2021:0793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0794", "reference_id": "RHSA-2021:0794", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/73802?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.5.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.5.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/73803?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.7.2", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.7.2" }, { "url": "http://public2.vulnerablecode.io/api/packages/73805?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@5.0.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@5.0.1" } ], "aliases": [ "CVE-2021-26701", "GHSA-ghhp-997w-qr28" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bd3c-1sg9-wfh2" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7941?format=api", "vulnerability_id": "VCID-axvm-3dh9-3kf6", "summary": "Improper Input Validation\nA denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0247", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93536", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.9346", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93466", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93467", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93486", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93491", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93497", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93501", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93498", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93506", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93519", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.9353", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93431", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.9344", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93448", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93449", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.11122", "scoring_system": "epss", "scoring_elements": "0.93457", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0247" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://technet.microsoft.com/en-us/library/security/4021279.aspx" }, { "reference_url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0247", "reference_id": "CVE-2017-0247", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0247" }, { "reference_url": "https://github.com/advisories/GHSA-6xh7-4v2w-36q6", "reference_id": "GHSA-6xh7-4v2w-36q6", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-6xh7-4v2w-36q6" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/31143?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.0.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bd3c-1sg9-wfh2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/31145?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.3.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bd3c-1sg9-wfh2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1" } ], "aliases": [ "CVE-2017-0247", "GHSA-6xh7-4v2w-36q6" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-axvm-3dh9-3kf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7939?format=api", "vulnerability_id": "VCID-b2mg-kc6t-z7ht", "summary": "Improper Input Validation\nA spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0256", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.89012", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88953", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8897", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88977", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88984", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88998", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.89008", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.89002", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8889", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88899", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88935", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.8894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88952", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88946", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88945", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88958", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04349", "scoring_system": "epss", "scoring_elements": "0.88956", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0256" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0256", "reference_id": "CVE-2017-0256", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0256" }, { "reference_url": "https://github.com/advisories/GHSA-j8f4-2w4p-mhjc", "reference_id": "GHSA-j8f4-2w4p-mhjc", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-j8f4-2w4p-mhjc" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/31143?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.0.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bd3c-1sg9-wfh2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/31145?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.3.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bd3c-1sg9-wfh2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1" } ], "aliases": [ "CVE-2017-0256", "GHSA-j8f4-2w4p-mhjc" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b2mg-kc6t-z7ht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/9907?format=api", "vulnerability_id": "VCID-j4d8-wr24-63d3", "summary": "Improper Certificate Validation\nMicrosoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka \".NET Security Feature Bypass Vulnerability.\"", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0248", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78102", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7804", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7805", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78076", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78093", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78083", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77902", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77937", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77919", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77946", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.7795", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77977", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77961", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77994", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77993", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.77987", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78019", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01092", "scoring_system": "epss", "scoring_elements": "0.78027", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0248" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0248", "reference_id": "CVE-2017-0248", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0248" }, { "reference_url": "https://github.com/advisories/GHSA-ch6p-4jcm-h8vh", "reference_id": "GHSA-ch6p-4jcm-h8vh", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-ch6p-4jcm-h8vh" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/31143?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.0.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bd3c-1sg9-wfh2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/31145?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.3.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bd3c-1sg9-wfh2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1" } ], "aliases": [ "CVE-2017-0248", "GHSA-ch6p-4jcm-h8vh" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j4d8-wr24-63d3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7933?format=api", "vulnerability_id": "VCID-mrpr-pw4n-bfae", "summary": "Improper Input Validation\nAn elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0249", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90567", "published_at": "2026-05-12T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90496", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90513", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90511", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90523", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90519", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90531", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90549", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.9056", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90558", "published_at": "2026-05-11T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90455", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90459", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90471", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90477", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90489", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90495", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05786", "scoring_system": "epss", "scoring_elements": "0.90502", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-0249" }, { "reference_url": "https://github.com/aspnet/Announcements/issues/239", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/aspnet/Announcements/issues/239" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0249", "reference_id": "CVE-2017-0249", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-0249" }, { "reference_url": "https://github.com/advisories/GHSA-qhqf-ghgh-x2m4", "reference_id": "GHSA-qhqf-ghgh-x2m4", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-qhqf-ghgh-x2m4" }, { "reference_url": "https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7", "reference_id": "GHSA-wj4j-gr3f-cfh7", "reference_type": "", "scores": [ { "value": "7.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/31143?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.0.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bd3c-1sg9-wfh2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1" }, { "url": "http://public2.vulnerablecode.io/api/packages/31145?format=api", "purl": "pkg:nuget/System.Text.Encodings.Web@4.3.1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-bd3c-1sg9-wfh2" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1" } ], "aliases": [ "CVE-2017-0249", "GHSA-qhqf-ghgh-x2m4" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mrpr-pw4n-bfae" } ], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1" }