{"url":"http://public2.vulnerablecode.io/api/packages/31145?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.3.1","type":"nuget","namespace":"","name":"System.Text.Encodings.Web","version":"4.3.1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"4.5.1","latest_non_vulnerable_version":"5.0.1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34615?format=json","vulnerability_id":"VCID-bd3c-1sg9-wfh2","summary":".NET Core Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24112.\n\n### Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 5.0, .NET Core 3.1, and .NET Core 2.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nA remote code execution vulnerability exists in .NET 5 and .NET Core due to how text encoding is performed.\n\n### Discussion\n\nDiscussion for this issue can be found at dotnet/runtime#49377\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n### Affected software\n\nThe vulnerable package is `System.Text.Encodings.Web` . Upgrading your package and redeploying your app should be sufficient to address this vulnerability.\n\nVulnerable package versions:\n\nAny .NET 5, .NET Core, or .NET Framework based application that uses the System.Text.Encodings.Web package with a vulnerable version listed below.\n\nPackage Name | Vulnerable Versions | Secure Versions\n-|-|-\nSystem.Text.Encodings.Web | 4.0.0 - 4.5.0 | 4.5.1\nSystem.Text.Encodings.Web |  4.6.0-4.7.1 | 4.7.2\nSystem.Text.Encodings.Web | 5.0.0 |  5.0.1\n\n\nPlease validate that each of the .NET versions you are using is in support. Security updates are only provided for supported .NET versions.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26701.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-26701.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26701","reference_id":"","reference_type":"","scores":[{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.86119","published_at":"2026-05-15T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.85999","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.86","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.8599","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.8595","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.85965","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.85963","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.85958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.85976","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.8598","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.85971","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.86109","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.86069","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.86056","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.86059","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.86042","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02731","scoring_system":"epss","scoring_elements":"0.86019","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02772","scoring_system":"epss","scoring_elements":"0.86003","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0295","scoring_system":"epss","scoring_elements":"0.86444","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02994","scoring_system":"epss","scoring_elements":"0.865","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02994","scoring_system":"epss","scoring_elements":"0.8649","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-26701"},{"reference_url":"https://github.com/dotnet/announcements/issues/178","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/dotnet/announcements/issues/178"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S2AZOUKMCHT2WBHR7MYDTYXWOBHZW5P5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TW3ZSJTTMZAFKGW7NJWTVVFZUYYU2SJZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBOSSX7U6BSHV5RI74FCOW4ITJ5RRJR5/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WA5WQJVHUL5C4XMJTLY3C67R4WP35EF4/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPUKFHIGP5YNJRRFWKDJ2XRS4WTFJNNK/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YLFATXASXW4OV2ZBSRP4G55HJH73QPBP/"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26701","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-26701"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"CRITICAL","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26701"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1933740","reference_id":"1933740","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1933740"},{"reference_url":"https://security.archlinux.org/ASA-202103-20","reference_id":"ASA-202103-20","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-20"},{"reference_url":"https://security.archlinux.org/ASA-202103-21","reference_id":"ASA-202103-21","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202103-21"},{"reference_url":"https://security.archlinux.org/AVG-1698","reference_id":"AVG-1698","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-1698"},{"reference_url":"https://github.com/advisories/GHSA-ghhp-997w-qr28","reference_id":"GHSA-ghhp-997w-qr28","reference_type":"","scores":[{"value":"CRITICAL","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-ghhp-997w-qr28"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0787","reference_id":"RHSA-2021:0787","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0788","reference_id":"RHSA-2021:0788","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0789","reference_id":"RHSA-2021:0789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0790","reference_id":"RHSA-2021:0790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0793","reference_id":"RHSA-2021:0793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0794","reference_id":"RHSA-2021:0794","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0794"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/73802?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.5.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.5.1"},{"url":"http://public2.vulnerablecode.io/api/packages/73803?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.7.2","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.7.2"},{"url":"http://public2.vulnerablecode.io/api/packages/73805?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@5.0.1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@5.0.1"}],"aliases":["CVE-2021-26701","GHSA-ghhp-997w-qr28"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bd3c-1sg9-wfh2"}],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7941?format=json","vulnerability_id":"VCID-axvm-3dh9-3kf6","summary":"Improper Input Validation\nA denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0247","reference_id":"","reference_type":"","scores":[{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93555","published_at":"2026-05-15T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93467","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93501","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93498","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93506","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93519","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.9353","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93536","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93549","published_at":"2026-05-14T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93431","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.9344","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93448","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.9346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93466","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0247"},{"reference_url":"https://github.com/aspnet/Announcements/issues/239","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/aspnet/Announcements/issues/239"},{"reference_url":"https://technet.microsoft.com/en-us/library/security/4021279.aspx","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://technet.microsoft.com/en-us/library/security/4021279.aspx"},{"reference_url":"https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0247","reference_id":"CVE-2017-0247","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0247"},{"reference_url":"https://github.com/advisories/GHSA-6xh7-4v2w-36q6","reference_id":"GHSA-6xh7-4v2w-36q6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/31143?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bd3c-1sg9-wfh2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1"},{"url":"http://public2.vulnerablecode.io/api/packages/31145?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.3.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bd3c-1sg9-wfh2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1"}],"aliases":["CVE-2017-0247","GHSA-6xh7-4v2w-36q6"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-axvm-3dh9-3kf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7939?format=json","vulnerability_id":"VCID-b2mg-kc6t-z7ht","summary":"Improper Input Validation\nA spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0256","reference_id":"","reference_type":"","scores":[{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.8904","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88998","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.89008","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.89002","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.89012","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.8903","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.8889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.8894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.8897","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0256"},{"reference_url":"https://github.com/aspnet/Announcements/issues/239","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/aspnet/Announcements/issues/239"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0256","reference_id":"CVE-2017-0256","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0256"},{"reference_url":"https://github.com/advisories/GHSA-j8f4-2w4p-mhjc","reference_id":"GHSA-j8f4-2w4p-mhjc","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-j8f4-2w4p-mhjc"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/31143?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bd3c-1sg9-wfh2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1"},{"url":"http://public2.vulnerablecode.io/api/packages/31145?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.3.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bd3c-1sg9-wfh2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1"}],"aliases":["CVE-2017-0256","GHSA-j8f4-2w4p-mhjc"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2mg-kc6t-z7ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/9907?format=json","vulnerability_id":"VCID-j4d8-wr24-63d3","summary":"Improper Certificate Validation\nMicrosoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka \".NET Security Feature Bypass Vulnerability.\"","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0248","reference_id":"","reference_type":"","scores":[{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7816","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78076","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78093","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78083","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78102","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78145","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77902","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77994","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77987","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7805","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0248"},{"reference_url":"https://github.com/aspnet/Announcements/issues/239","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/aspnet/Announcements/issues/239"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0248","reference_id":"CVE-2017-0248","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0248"},{"reference_url":"https://github.com/advisories/GHSA-ch6p-4jcm-h8vh","reference_id":"GHSA-ch6p-4jcm-h8vh","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-ch6p-4jcm-h8vh"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/31143?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bd3c-1sg9-wfh2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1"},{"url":"http://public2.vulnerablecode.io/api/packages/31145?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.3.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bd3c-1sg9-wfh2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1"}],"aliases":["CVE-2017-0248","GHSA-ch6p-4jcm-h8vh"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4d8-wr24-63d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7933?format=json","vulnerability_id":"VCID-mrpr-pw4n-bfae","summary":"Improper Input Validation\nAn elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0249","reference_id":"","reference_type":"","scores":[{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90587","published_at":"2026-05-15T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90511","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90523","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90531","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90549","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.9056","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90558","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90567","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.9058","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90455","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90459","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90471","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90496","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90513","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0249"},{"reference_url":"https://github.com/aspnet/Announcements/issues/239","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/aspnet/Announcements/issues/239"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0249","reference_id":"CVE-2017-0249","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0249"},{"reference_url":"https://github.com/advisories/GHSA-qhqf-ghgh-x2m4","reference_id":"GHSA-qhqf-ghgh-x2m4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-qhqf-ghgh-x2m4"},{"reference_url":"https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7","reference_id":"GHSA-wj4j-gr3f-cfh7","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/31143?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.0.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bd3c-1sg9-wfh2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.0.1"},{"url":"http://public2.vulnerablecode.io/api/packages/31145?format=json","purl":"pkg:nuget/System.Text.Encodings.Web@4.3.1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-bd3c-1sg9-wfh2"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1"}],"aliases":["CVE-2017-0249","GHSA-qhqf-ghgh-x2m4"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mrpr-pw4n-bfae"}],"risk_score":"4.5","resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/System.Text.Encodings.Web@4.3.1"}