Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/nodejs-tough-cookie@2.3.1-1?arch=el7
Typerpm
Namespaceredhat
Namenodejs-tough-cookie
Version2.3.1-1
Qualifiers
arch el7
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-atyy-fepb-6yge
vulnerability_id VCID-atyy-fepb-6yge
summary
Multiple vulnerabilities have been found in Node.js, the worst of
    which can allow remote attackers to cause Denial of Service conditions.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5325.json
reference_id
reference_type
scores
0
value 4.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5325.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5325
reference_id
reference_type
scores
0
value 0.00985
scoring_system epss
scoring_elements 0.76765
published_at 2026-04-01T12:55:00Z
1
value 0.00985
scoring_system epss
scoring_elements 0.76769
published_at 2026-04-02T12:55:00Z
2
value 0.00985
scoring_system epss
scoring_elements 0.76798
published_at 2026-04-04T12:55:00Z
3
value 0.00985
scoring_system epss
scoring_elements 0.76779
published_at 2026-04-07T12:55:00Z
4
value 0.00985
scoring_system epss
scoring_elements 0.7681
published_at 2026-04-08T12:55:00Z
5
value 0.00985
scoring_system epss
scoring_elements 0.7682
published_at 2026-04-09T12:55:00Z
6
value 0.00985
scoring_system epss
scoring_elements 0.76849
published_at 2026-04-11T12:55:00Z
7
value 0.00985
scoring_system epss
scoring_elements 0.76829
published_at 2026-04-12T12:55:00Z
8
value 0.00985
scoring_system epss
scoring_elements 0.76822
published_at 2026-04-13T12:55:00Z
9
value 0.00985
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-16T12:55:00Z
10
value 0.00985
scoring_system epss
scoring_elements 0.76871
published_at 2026-04-18T12:55:00Z
11
value 0.00985
scoring_system epss
scoring_elements 0.76862
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5325
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5325
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5325
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1346910
reference_id 1346910
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1346910
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839714
reference_id 839714
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=839714
6
reference_url https://security.gentoo.org/glsa/201612-43
reference_id GLSA-201612-43
reference_type
scores
url https://security.gentoo.org/glsa/201612-43
7
reference_url https://access.redhat.com/errata/RHSA-2017:0002
reference_id RHSA-2017:0002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0002
fixed_packages
aliases CVE-2016-5325
risk_score 2.1
exploitability 0.5
weighted_severity 4.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-atyy-fepb-6yge
1
url VCID-ep8y-hq9y-afcu
vulnerability_id VCID-ep8y-hq9y-afcu
summary atomic-openshift: cluster-reader can escalate to creating builds via webhooks in any project
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15138.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15138
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37439
published_at 2026-04-01T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37605
published_at 2026-04-02T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37628
published_at 2026-04-04T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37506
published_at 2026-04-07T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37557
published_at 2026-04-08T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.3757
published_at 2026-04-09T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37584
published_at 2026-04-11T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.3755
published_at 2026-04-12T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37524
published_at 2026-04-13T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37571
published_at 2026-04-16T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37552
published_at 2026-04-18T12:55:00Z
11
value 0.00165
scoring_system epss
scoring_elements 0.37487
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15138
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566212
reference_id 1566212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566212
fixed_packages
aliases CVE-2017-15138
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8y-hq9y-afcu
2
url VCID-gcrq-1at1-bygq
vulnerability_id VCID-gcrq-1at1-bygq
summary
Improper Input Validation
NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0.
references
0
reference_url https://access.redhat.com/errata/RHSA-2016:2101
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2016:2101
1
reference_url https://access.redhat.com/errata/RHSA-2017:2912
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHSA-2017:2912
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000232.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000232.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-1000232
reference_id
reference_type
scores
0
value 0.00921
scoring_system epss
scoring_elements 0.75909
published_at 2026-04-01T12:55:00Z
1
value 0.00921
scoring_system epss
scoring_elements 0.75991
published_at 2026-04-21T12:55:00Z
2
value 0.00921
scoring_system epss
scoring_elements 0.76006
published_at 2026-04-18T12:55:00Z
3
value 0.00921
scoring_system epss
scoring_elements 0.76003
published_at 2026-04-16T12:55:00Z
4
value 0.00921
scoring_system epss
scoring_elements 0.75964
published_at 2026-04-13T12:55:00Z
5
value 0.00921
scoring_system epss
scoring_elements 0.75971
published_at 2026-04-12T12:55:00Z
6
value 0.00921
scoring_system epss
scoring_elements 0.75994
published_at 2026-04-11T12:55:00Z
7
value 0.00921
scoring_system epss
scoring_elements 0.7597
published_at 2026-04-09T12:55:00Z
8
value 0.00921
scoring_system epss
scoring_elements 0.75956
published_at 2026-04-08T12:55:00Z
9
value 0.00921
scoring_system epss
scoring_elements 0.75923
published_at 2026-04-07T12:55:00Z
10
value 0.00921
scoring_system epss
scoring_elements 0.75945
published_at 2026-04-04T12:55:00Z
11
value 0.00921
scoring_system epss
scoring_elements 0.75913
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-1000232
4
reference_url https://github.com/salesforce/tough-cookie
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/salesforce/tough-cookie
5
reference_url https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/salesforce/tough-cookie/commit/615627206357d997d5e6ff9da158997de05235ae
6
reference_url https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/salesforce/tough-cookie/commit/e4fc2e0f9ee1b7a818d68f0ac7ea696f377b1534
7
reference_url https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232
8
reference_url https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232/
reference_id
reference_type
scores
url https://www.ibm.com/blogs/psirt/ibm-security-bulletin-ibm-api-connect-is-affected-by-node-js-tough-cookie-module-vulnerability-to-a-denial-of-service-cve-2016-1000232/
9
reference_url https://www.npmjs.com/advisories/130
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://www.npmjs.com/advisories/130
10
reference_url https://github.com/nodejs/security-wg/blob/main/vuln/npm/130.json
reference_id 130
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements
url https://github.com/nodejs/security-wg/blob/main/vuln/npm/130.json
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1359818
reference_id 1359818
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1359818
12
reference_url https://access.redhat.com/security/cve/cve-2016-1000232
reference_id CVE-2016-1000232
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/cve-2016-1000232
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2016-1000232
reference_id CVE-2016-1000232
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2016-1000232
14
reference_url https://github.com/advisories/GHSA-qhv9-728r-6jqg
reference_id GHSA-qhv9-728r-6jqg
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-qhv9-728r-6jqg
fixed_packages
aliases CVE-2016-1000232, GHSA-qhv9-728r-6jqg
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gcrq-1at1-bygq
3
url VCID-jqgq-yvxr-r7hs
vulnerability_id VCID-jqgq-yvxr-r7hs
summary 3: authentication bypass for elasticsearch with external routes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12195.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12195
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41803
published_at 2026-04-01T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41868
published_at 2026-04-02T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41896
published_at 2026-04-04T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41824
published_at 2026-04-07T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41874
published_at 2026-04-08T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41884
published_at 2026-04-18T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41908
published_at 2026-04-11T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41873
published_at 2026-04-12T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41861
published_at 2026-04-13T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41911
published_at 2026-04-16T12:55:00Z
10
value 0.00198
scoring_system epss
scoring_elements 0.41813
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12195
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1501986
reference_id 1501986
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1501986
3
reference_url https://access.redhat.com/errata/RHSA-2017:3188
reference_id RHSA-2017:3188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3188
4
reference_url https://access.redhat.com/errata/RHSA-2017:3389
reference_id RHSA-2017:3389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3389
fixed_packages
aliases CVE-2017-12195
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqgq-yvxr-r7hs
4
url VCID-u9ph-5sbd-mfgp
vulnerability_id VCID-u9ph-5sbd-mfgp
summary
Information Exposure
Jenkins allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins.
references
0
reference_url https://access.redhat.com/errata/RHBA-2018:1816
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2018:1816
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000169.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000169.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000169
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40246
published_at 2026-04-16T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40198
published_at 2026-04-13T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40217
published_at 2026-04-12T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40085
published_at 2026-04-01T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40234
published_at 2026-04-02T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40256
published_at 2026-04-11T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40258
published_at 2026-04-04T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.4018
published_at 2026-04-07T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40244
published_at 2026-04-09T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40233
published_at 2026-04-08T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.4014
published_at 2026-04-21T12:55:00Z
11
value 0.00185
scoring_system epss
scoring_elements 0.40216
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000169
3
reference_url https://github.com/jenkinsci/jenkins/commit/69a784bb8d2c5a021d225eda2d392fb081c1169e
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/69a784bb8d2c5a021d225eda2d392fb081c1169e
4
reference_url https://jenkins.io/security/advisory/2018-04-11/#SECURITY-754
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2018-04-11/#SECURITY-754
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566947
reference_id 1566947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566947
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000169
reference_id CVE-2018-1000169
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000169
7
reference_url https://github.com/advisories/GHSA-cpw3-x7gf-p872
reference_id GHSA-cpw3-x7gf-p872
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cpw3-x7gf-p872
fixed_packages
aliases CVE-2018-1000169, GHSA-cpw3-x7gf-p872
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9ph-5sbd-mfgp
5
url VCID-vtvy-ec7a-xua9
vulnerability_id VCID-vtvy-ec7a-xua9
summary atomic-openshift: image import whitelist can be bypassed by creating an imagestream or using oc tag
references
0
reference_url https://access.redhat.com/errata/RHBA-2018:0489
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2018:0489
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15137.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15137.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15137
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37698
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37764
published_at 2026-04-21T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37825
published_at 2026-04-12T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37799
published_at 2026-04-13T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37826
published_at 2026-04-18T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.3788
published_at 2026-04-02T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37904
published_at 2026-04-04T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37783
published_at 2026-04-07T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37833
published_at 2026-04-08T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-16T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37861
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15137
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15137
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15137
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566191
reference_id 1566191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566191
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:-:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15137
reference_id CVE-2017-15137
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
2
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15137
fixed_packages
aliases CVE-2017-15137
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vtvy-ec7a-xua9
Fixing_vulnerabilities
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs-tough-cookie@2.3.1-1%3Farch=el7