Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/nodejs-methods@1.1.1-1?arch=el7aos
Typerpm
Namespaceredhat
Namenodejs-methods
Version1.1.1-1
Qualifiers
arch el7aos
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-ep8y-hq9y-afcu
vulnerability_id VCID-ep8y-hq9y-afcu
summary atomic-openshift: cluster-reader can escalate to creating builds via webhooks in any project
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15138.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15138
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37439
published_at 2026-04-01T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.37605
published_at 2026-04-02T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37628
published_at 2026-04-04T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37506
published_at 2026-04-07T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37557
published_at 2026-04-08T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.3757
published_at 2026-04-09T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37584
published_at 2026-04-11T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.3755
published_at 2026-04-12T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.37524
published_at 2026-04-13T12:55:00Z
9
value 0.00165
scoring_system epss
scoring_elements 0.37571
published_at 2026-04-16T12:55:00Z
10
value 0.00165
scoring_system epss
scoring_elements 0.37552
published_at 2026-04-18T12:55:00Z
11
value 0.00165
scoring_system epss
scoring_elements 0.37487
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15138
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566212
reference_id 1566212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566212
fixed_packages
aliases CVE-2017-15138
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ep8y-hq9y-afcu
1
url VCID-jqgq-yvxr-r7hs
vulnerability_id VCID-jqgq-yvxr-r7hs
summary 3: authentication bypass for elasticsearch with external routes
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12195.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-12195.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-12195
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41803
published_at 2026-04-01T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.41868
published_at 2026-04-02T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41896
published_at 2026-04-04T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41824
published_at 2026-04-07T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41874
published_at 2026-04-08T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41884
published_at 2026-04-18T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41908
published_at 2026-04-11T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41873
published_at 2026-04-12T12:55:00Z
8
value 0.00198
scoring_system epss
scoring_elements 0.41861
published_at 2026-04-13T12:55:00Z
9
value 0.00198
scoring_system epss
scoring_elements 0.41911
published_at 2026-04-16T12:55:00Z
10
value 0.00198
scoring_system epss
scoring_elements 0.41813
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-12195
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1501986
reference_id 1501986
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1501986
3
reference_url https://access.redhat.com/errata/RHSA-2017:3188
reference_id RHSA-2017:3188
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3188
4
reference_url https://access.redhat.com/errata/RHSA-2017:3389
reference_id RHSA-2017:3389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:3389
fixed_packages
aliases CVE-2017-12195
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jqgq-yvxr-r7hs
2
url VCID-u9ph-5sbd-mfgp
vulnerability_id VCID-u9ph-5sbd-mfgp
summary
Information Exposure
Jenkins allows unauthorized attackers to confirm the existence of agents or views with an attacker-specified name by sending a CLI command to Jenkins.
references
0
reference_url https://access.redhat.com/errata/RHBA-2018:1816
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/errata/RHBA-2018:1816
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000169.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000169.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-1000169
reference_id
reference_type
scores
0
value 0.00185
scoring_system epss
scoring_elements 0.40246
published_at 2026-04-16T12:55:00Z
1
value 0.00185
scoring_system epss
scoring_elements 0.40198
published_at 2026-04-13T12:55:00Z
2
value 0.00185
scoring_system epss
scoring_elements 0.40217
published_at 2026-04-12T12:55:00Z
3
value 0.00185
scoring_system epss
scoring_elements 0.40085
published_at 2026-04-01T12:55:00Z
4
value 0.00185
scoring_system epss
scoring_elements 0.40234
published_at 2026-04-02T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40256
published_at 2026-04-11T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40258
published_at 2026-04-04T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.4018
published_at 2026-04-07T12:55:00Z
8
value 0.00185
scoring_system epss
scoring_elements 0.40244
published_at 2026-04-09T12:55:00Z
9
value 0.00185
scoring_system epss
scoring_elements 0.40233
published_at 2026-04-08T12:55:00Z
10
value 0.00185
scoring_system epss
scoring_elements 0.4014
published_at 2026-04-21T12:55:00Z
11
value 0.00185
scoring_system epss
scoring_elements 0.40216
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-1000169
3
reference_url https://github.com/jenkinsci/jenkins/commit/69a784bb8d2c5a021d225eda2d392fb081c1169e
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/jenkinsci/jenkins/commit/69a784bb8d2c5a021d225eda2d392fb081c1169e
4
reference_url https://jenkins.io/security/advisory/2018-04-11/#SECURITY-754
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://jenkins.io/security/advisory/2018-04-11/#SECURITY-754
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566947
reference_id 1566947
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566947
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-1000169
reference_id CVE-2018-1000169
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-1000169
7
reference_url https://github.com/advisories/GHSA-cpw3-x7gf-p872
reference_id GHSA-cpw3-x7gf-p872
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-cpw3-x7gf-p872
fixed_packages
aliases CVE-2018-1000169, GHSA-cpw3-x7gf-p872
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9ph-5sbd-mfgp
3
url VCID-vtvy-ec7a-xua9
vulnerability_id VCID-vtvy-ec7a-xua9
summary atomic-openshift: image import whitelist can be bypassed by creating an imagestream or using oc tag
references
0
reference_url https://access.redhat.com/errata/RHBA-2018:0489
reference_id
reference_type
scores
url https://access.redhat.com/errata/RHBA-2018:0489
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15137.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-15137.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-15137
reference_id
reference_type
scores
0
value 0.00167
scoring_system epss
scoring_elements 0.37698
published_at 2026-04-01T12:55:00Z
1
value 0.00167
scoring_system epss
scoring_elements 0.37764
published_at 2026-04-21T12:55:00Z
2
value 0.00167
scoring_system epss
scoring_elements 0.37825
published_at 2026-04-12T12:55:00Z
3
value 0.00167
scoring_system epss
scoring_elements 0.37799
published_at 2026-04-13T12:55:00Z
4
value 0.00167
scoring_system epss
scoring_elements 0.37826
published_at 2026-04-18T12:55:00Z
5
value 0.00167
scoring_system epss
scoring_elements 0.3788
published_at 2026-04-02T12:55:00Z
6
value 0.00167
scoring_system epss
scoring_elements 0.37904
published_at 2026-04-04T12:55:00Z
7
value 0.00167
scoring_system epss
scoring_elements 0.37783
published_at 2026-04-07T12:55:00Z
8
value 0.00167
scoring_system epss
scoring_elements 0.37833
published_at 2026-04-08T12:55:00Z
9
value 0.00167
scoring_system epss
scoring_elements 0.37846
published_at 2026-04-16T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37861
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-15137
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15137
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15137
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1566191
reference_id 1566191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1566191
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:-:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift:-:*:*:*:*:*:*:*
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:openshift_container_platform:3.9:*:*:*:*:*:*:*
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-15137
reference_id CVE-2017-15137
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:P/A:N
1
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
2
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2017-15137
fixed_packages
aliases CVE-2017-15137
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vtvy-ec7a-xua9
Fixing_vulnerabilities
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/nodejs-methods@1.1.1-1%3Farch=el7aos