Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/nss@3.49-r0?arch=aarch64&distroversion=v3.17&reponame=community
Typeapk
Namespacealpine
Namenss
Version3.49-r0
Qualifiers
arch aarch64
distroversion v3.17
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.53.1-r0
Latest_non_vulnerable_version3.85-r1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-6fvj-phnx-kfgs
vulnerability_id VCID-6fvj-phnx-kfgs
summary After a HelloRetryRequest has been sent, the client may negotiate a lower protocol that TLS 1.3, resulting in an invalid state transition in the TLS State Machine. If the client gets into this state, incoming Application Data records will be ignored.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-17023.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
reference_id
reference_type
scores
0
value 0.00899
scoring_system epss
scoring_elements 0.75599
published_at 2026-04-01T12:55:00Z
1
value 0.00899
scoring_system epss
scoring_elements 0.75699
published_at 2026-04-18T12:55:00Z
2
value 0.00899
scoring_system epss
scoring_elements 0.75663
published_at 2026-04-12T12:55:00Z
3
value 0.00899
scoring_system epss
scoring_elements 0.75695
published_at 2026-04-16T12:55:00Z
4
value 0.00899
scoring_system epss
scoring_elements 0.75601
published_at 2026-04-02T12:55:00Z
5
value 0.00899
scoring_system epss
scoring_elements 0.75632
published_at 2026-04-04T12:55:00Z
6
value 0.00899
scoring_system epss
scoring_elements 0.75612
published_at 2026-04-07T12:55:00Z
7
value 0.00899
scoring_system epss
scoring_elements 0.75646
published_at 2026-04-08T12:55:00Z
8
value 0.00899
scoring_system epss
scoring_elements 0.75657
published_at 2026-04-13T12:55:00Z
9
value 0.00899
scoring_system epss
scoring_elements 0.75682
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-17023
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12399
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
reference_id 1791225
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1791225
7
reference_url https://security.archlinux.org/ASA-202001-1
reference_id ASA-202001-1
reference_type
scores
url https://security.archlinux.org/ASA-202001-1
8
reference_url https://security.archlinux.org/AVG-1084
reference_id AVG-1084
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1084
9
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
reference_id mfsa2020-01
reference_type
scores
0
value high
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2020-01
10
reference_url https://access.redhat.com/errata/RHSA-2020:3280
reference_id RHSA-2020:3280
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:3280
11
reference_url https://access.redhat.com/errata/RHSA-2020:4076
reference_id RHSA-2020:4076
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4076
12
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
13
reference_url https://usn.ubuntu.com/4234-1/
reference_id USN-4234-1
reference_type
scores
url https://usn.ubuntu.com/4234-1/
14
reference_url https://usn.ubuntu.com/4397-1/
reference_id USN-4397-1
reference_type
scores
url https://usn.ubuntu.com/4397-1/
fixed_packages
0
url pkg:apk/alpine/nss@3.49-r0?arch=aarch64&distroversion=v3.17&reponame=community
purl pkg:apk/alpine/nss@3.49-r0?arch=aarch64&distroversion=v3.17&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nss@3.49-r0%3Farch=aarch64&distroversion=v3.17&reponame=community
aliases CVE-2019-17023
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fvj-phnx-kfgs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/nss@3.49-r0%3Farch=aarch64&distroversion=v3.17&reponame=community