{"url":"http://public2.vulnerablecode.io/api/packages/31649?format=json","purl":"pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.0","type":"nuget","namespace":"","name":"Microsoft.AspNetCore.Mvc","version":"1.1.0","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.1.3","latest_non_vulnerable_version":"1.1.3","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7941?format=json","vulnerability_id":"VCID-axvm-3dh9-3kf6","summary":"Improper Input Validation\nA denial of service vulnerability exists when the ASP.NET Core fails to properly validate web requests. NOTE: Microsoft has not commented on third-party claims that the issue is that the TextEncoder.EncodeCore function in the System.Text.Encodings.Web package in ASP.NET Core Mvc allows remote attackers to cause a denial of service by leveraging failure to properly calculate the length of 4-byte characters in the Unicode Non-Character range.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0247","reference_id":"","reference_type":"","scores":[{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93506","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93448","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93449","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.9346","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93466","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93467","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93486","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93491","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93497","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93501","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93498","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.93431","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11122","scoring_system":"epss","scoring_elements":"0.9344","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0247"},{"reference_url":"https://github.com/aspnet/Announcements/issues/239","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/aspnet/Announcements/issues/239"},{"reference_url":"https://technet.microsoft.com/en-us/library/security/4021279.aspx","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://technet.microsoft.com/en-us/library/security/4021279.aspx"},{"reference_url":"https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.sidertia.com/Home/Community/Blog/2017/05/18/ASPNET-Core-Unicode-Non-Char-Encoding-DoS"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0247","reference_id":"CVE-2017-0247","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0247"},{"reference_url":"https://github.com/advisories/GHSA-6xh7-4v2w-36q6","reference_id":"GHSA-6xh7-4v2w-36q6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-6xh7-4v2w-36q6"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/30988?format=json","purl":"pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.3"}],"aliases":["CVE-2017-0247","GHSA-6xh7-4v2w-36q6"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-axvm-3dh9-3kf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7939?format=json","vulnerability_id":"VCID-b2mg-kc6t-z7ht","summary":"Improper Input Validation\nA spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0256","reference_id":"","reference_type":"","scores":[{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88984","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88946","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88945","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88958","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88956","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88953","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.8897","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88977","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.8889","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88899","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88917","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88935","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.8894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04349","scoring_system":"epss","scoring_elements":"0.88952","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0256"},{"reference_url":"https://github.com/aspnet/Announcements/issues/239","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/aspnet/Announcements/issues/239"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0256","reference_id":"CVE-2017-0256","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0256"},{"reference_url":"https://github.com/advisories/GHSA-j8f4-2w4p-mhjc","reference_id":"GHSA-j8f4-2w4p-mhjc","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-j8f4-2w4p-mhjc"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/30988?format=json","purl":"pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.3"}],"aliases":["CVE-2017-0256","GHSA-j8f4-2w4p-mhjc"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b2mg-kc6t-z7ht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/9907?format=json","vulnerability_id":"VCID-j4d8-wr24-63d3","summary":"Improper Certificate Validation\nMicrosoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka \".NET Security Feature Bypass Vulnerability.\"","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0248","reference_id":"","reference_type":"","scores":[{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7805","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77987","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78019","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.78027","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77902","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77937","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77919","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77946","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.7795","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77961","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77994","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0248"},{"reference_url":"https://github.com/aspnet/Announcements/issues/239","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/aspnet/Announcements/issues/239"},{"reference_url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0248","reference_id":"CVE-2017-0248","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0248"},{"reference_url":"https://github.com/advisories/GHSA-ch6p-4jcm-h8vh","reference_id":"GHSA-ch6p-4jcm-h8vh","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-ch6p-4jcm-h8vh"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/30988?format=json","purl":"pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.3"}],"aliases":["CVE-2017-0248","GHSA-ch6p-4jcm-h8vh"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j4d8-wr24-63d3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/7933?format=json","vulnerability_id":"VCID-mrpr-pw4n-bfae","summary":"Improper Input Validation\nAn elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0249","reference_id":"","reference_type":"","scores":[{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90531","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90477","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90489","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90495","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90496","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90513","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90511","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90523","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90519","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90455","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90459","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05786","scoring_system":"epss","scoring_elements":"0.90471","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-0249"},{"reference_url":"https://github.com/aspnet/Announcements/issues/239","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/aspnet/Announcements/issues/239"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0249","reference_id":"CVE-2017-0249","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-0249"},{"reference_url":"https://github.com/advisories/GHSA-qhqf-ghgh-x2m4","reference_id":"GHSA-qhqf-ghgh-x2m4","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-qhqf-ghgh-x2m4"},{"reference_url":"https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7","reference_id":"GHSA-wj4j-gr3f-cfh7","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/Aiko-IT-Systems/DisCatSharp/security/advisories/GHSA-wj4j-gr3f-cfh7"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/30988?format=json","purl":"pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.3"}],"aliases":["CVE-2017-0249","GHSA-qhqf-ghgh-x2m4"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mrpr-pw4n-bfae"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:nuget/Microsoft.AspNetCore.Mvc@1.1.0"}