Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/rh-dotnet31-dotnet@3.1.106-1?arch=el7
Typerpm
Namespaceredhat
Namerh-dotnet31-dotnet
Version3.1.106-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-zy2q-8hz7-s7br
vulnerability_id VCID-zy2q-8hz7-s7br
summary A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
references
0
reference_url http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/
url http://packetstormsecurity.com/files/158694/SharePoint-DataSet-DataTable-Deserialization.html
1
reference_url http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/
url http://packetstormsecurity.com/files/158876/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
2
reference_url http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/
url http://packetstormsecurity.com/files/163644/Microsoft-SharePoint-Server-2019-Remote-Code-Execution.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1147.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1147.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1147
reference_id
reference_type
scores
0
value 0.9343
scoring_system epss
scoring_elements 0.9982
published_at 2026-04-21T12:55:00Z
1
value 0.9343
scoring_system epss
scoring_elements 0.99815
published_at 2026-04-07T12:55:00Z
2
value 0.9343
scoring_system epss
scoring_elements 0.99817
published_at 2026-04-13T12:55:00Z
3
value 0.9343
scoring_system epss
scoring_elements 0.99818
published_at 2026-04-18T12:55:00Z
4
value 0.9343
scoring_system epss
scoring_elements 0.99816
published_at 2026-04-09T12:55:00Z
5
value 0.93496
scoring_system epss
scoring_elements 0.99823
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1147
5
reference_url https://github.com/dotnet/announcements/issues/159
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dotnet/announcements/issues/159
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1147
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-1147
7
reference_url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/
url https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1147
8
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1147
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-1147
9
reference_url https://www.exploitalert.com/view-details.html?id=35992
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:H
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T19:25:47Z/
url https://www.exploitalert.com/view-details.html?id=35992
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1856929
reference_id 1856929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1856929
11
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aspx/webapps/48747.py
reference_id CVE-2020-1147
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aspx/webapps/48747.py
12
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aspx/webapps/50151.py
reference_id CVE-2020-1147
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/aspx/webapps/50151.py
13
reference_url https://github.com/advisories/GHSA-g5vf-38cp-4px9
reference_id GHSA-g5vf-38cp-4px9
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-g5vf-38cp-4px9
14
reference_url https://access.redhat.com/errata/RHSA-2020:2937
reference_id RHSA-2020:2937
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2937
15
reference_url https://access.redhat.com/errata/RHSA-2020:2938
reference_id RHSA-2020:2938
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2938
16
reference_url https://access.redhat.com/errata/RHSA-2020:2939
reference_id RHSA-2020:2939
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2939
17
reference_url https://access.redhat.com/errata/RHSA-2020:2954
reference_id RHSA-2020:2954
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2954
18
reference_url https://access.redhat.com/errata/RHSA-2020:2988
reference_id RHSA-2020:2988
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2988
19
reference_url https://access.redhat.com/errata/RHSA-2020:2989
reference_id RHSA-2020:2989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2989
fixed_packages
aliases CVE-2020-1147, GHSA-g5vf-38cp-4px9
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zy2q-8hz7-s7br
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/rh-dotnet31-dotnet@3.1.106-1%3Farch=el7