Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
Typeapk
Namespacealpine
Namegst-plugins-bad1
Version1.8.3-r0
Qualifiers
arch x86_64
distroversion v3.4
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-646n-bbd9-rfak
vulnerability_id VCID-646n-bbd9-rfak
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9813.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9813.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9813
reference_id
reference_type
scores
0
value 0.04811
scoring_system epss
scoring_elements 0.89461
published_at 2026-04-01T12:55:00Z
1
value 0.04811
scoring_system epss
scoring_elements 0.89465
published_at 2026-04-02T12:55:00Z
2
value 0.04811
scoring_system epss
scoring_elements 0.89476
published_at 2026-04-04T12:55:00Z
3
value 0.04811
scoring_system epss
scoring_elements 0.89477
published_at 2026-04-07T12:55:00Z
4
value 0.04811
scoring_system epss
scoring_elements 0.89493
published_at 2026-04-08T12:55:00Z
5
value 0.04811
scoring_system epss
scoring_elements 0.89497
published_at 2026-04-09T12:55:00Z
6
value 0.04811
scoring_system epss
scoring_elements 0.89506
published_at 2026-04-11T12:55:00Z
7
value 0.04811
scoring_system epss
scoring_elements 0.89504
published_at 2026-04-12T12:55:00Z
8
value 0.04811
scoring_system epss
scoring_elements 0.89499
published_at 2026-04-13T12:55:00Z
9
value 0.04811
scoring_system epss
scoring_elements 0.89513
published_at 2026-04-16T12:55:00Z
10
value 0.04811
scoring_system epss
scoring_elements 0.89514
published_at 2026-04-18T12:55:00Z
11
value 0.04811
scoring_system epss
scoring_elements 0.89511
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9813
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:C
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1401934
reference_id 1401934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1401934
9
reference_url https://bugzilla.gnome.org/show_bug.cgi?id=775120
reference_id CVE-2016-9813
reference_type exploit
scores
url https://bugzilla.gnome.org/show_bug.cgi?id=775120
10
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42162.txt
reference_id CVE-2016-9813
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/42162.txt
11
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
12
reference_url https://access.redhat.com/errata/RHSA-2017:0021
reference_id RHSA-2017:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0021
fixed_packages
0
url pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0%3Farch=x86_64&distroversion=v3.4&reponame=main
aliases CVE-2016-9813
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-646n-bbd9-rfak
1
url VCID-67ga-bujk-n7f8
vulnerability_id VCID-67ga-bujk-n7f8
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9812.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9812.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9812
reference_id
reference_type
scores
0
value 0.01408
scoring_system epss
scoring_elements 0.80432
published_at 2026-04-01T12:55:00Z
1
value 0.01408
scoring_system epss
scoring_elements 0.80438
published_at 2026-04-02T12:55:00Z
2
value 0.01408
scoring_system epss
scoring_elements 0.80459
published_at 2026-04-04T12:55:00Z
3
value 0.01408
scoring_system epss
scoring_elements 0.80448
published_at 2026-04-07T12:55:00Z
4
value 0.01408
scoring_system epss
scoring_elements 0.80478
published_at 2026-04-08T12:55:00Z
5
value 0.01408
scoring_system epss
scoring_elements 0.80488
published_at 2026-04-09T12:55:00Z
6
value 0.01408
scoring_system epss
scoring_elements 0.80506
published_at 2026-04-11T12:55:00Z
7
value 0.01408
scoring_system epss
scoring_elements 0.80491
published_at 2026-04-12T12:55:00Z
8
value 0.01408
scoring_system epss
scoring_elements 0.80484
published_at 2026-04-13T12:55:00Z
9
value 0.01408
scoring_system epss
scoring_elements 0.80512
published_at 2026-04-16T12:55:00Z
10
value 0.01408
scoring_system epss
scoring_elements 0.80514
published_at 2026-04-18T12:55:00Z
11
value 0.01408
scoring_system epss
scoring_elements 0.80516
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9812
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1401930
reference_id 1401930
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1401930
9
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
10
reference_url https://access.redhat.com/errata/RHSA-2017:0021
reference_id RHSA-2017:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0021
fixed_packages
0
url pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0%3Farch=x86_64&distroversion=v3.4&reponame=main
aliases CVE-2016-9812
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67ga-bujk-n7f8
2
url VCID-qmvc-ed84-h7bj
vulnerability_id VCID-qmvc-ed84-h7bj
summary Multiple SQL injection vulnerabilities in the FAQ package 2.x before 2.3.6, 4.x before 4.0.5, and 5.x before 5.0.5 in Open Ticket Request System (OTRS) allow remote attackers to execute arbitrary SQL commands via crafted search parameters.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5843
reference_id
reference_type
scores
0
value 0.0103
scoring_system epss
scoring_elements 0.77258
published_at 2026-04-01T12:55:00Z
1
value 0.0103
scoring_system epss
scoring_elements 0.77264
published_at 2026-04-02T12:55:00Z
2
value 0.0103
scoring_system epss
scoring_elements 0.77293
published_at 2026-04-04T12:55:00Z
3
value 0.0103
scoring_system epss
scoring_elements 0.77274
published_at 2026-04-07T12:55:00Z
4
value 0.0103
scoring_system epss
scoring_elements 0.77305
published_at 2026-04-08T12:55:00Z
5
value 0.0103
scoring_system epss
scoring_elements 0.77314
published_at 2026-04-09T12:55:00Z
6
value 0.0103
scoring_system epss
scoring_elements 0.77341
published_at 2026-04-11T12:55:00Z
7
value 0.0103
scoring_system epss
scoring_elements 0.77321
published_at 2026-04-12T12:55:00Z
8
value 0.0103
scoring_system epss
scoring_elements 0.77318
published_at 2026-04-13T12:55:00Z
9
value 0.0103
scoring_system epss
scoring_elements 0.77357
published_at 2026-04-18T12:55:00Z
10
value 0.0103
scoring_system epss
scoring_elements 0.77349
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5843
fixed_packages
0
url pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0%3Farch=x86_64&distroversion=v3.4&reponame=main
aliases CVE-2016-5843
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qmvc-ed84-h7bj
3
url VCID-qync-5kha-4bgu
vulnerability_id VCID-qync-5kha-4bgu
summary
Multiple vulnerabilities have been found in various GStreamer
    plug-ins, the worst of which could lead to the execution of arbitrary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9809.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-9809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-9809
reference_id
reference_type
scores
0
value 0.00471
scoring_system epss
scoring_elements 0.64521
published_at 2026-04-01T12:55:00Z
1
value 0.00471
scoring_system epss
scoring_elements 0.64574
published_at 2026-04-02T12:55:00Z
2
value 0.00471
scoring_system epss
scoring_elements 0.64603
published_at 2026-04-13T12:55:00Z
3
value 0.00471
scoring_system epss
scoring_elements 0.64561
published_at 2026-04-07T12:55:00Z
4
value 0.00471
scoring_system epss
scoring_elements 0.64609
published_at 2026-04-08T12:55:00Z
5
value 0.00471
scoring_system epss
scoring_elements 0.64626
published_at 2026-04-09T12:55:00Z
6
value 0.00471
scoring_system epss
scoring_elements 0.64644
published_at 2026-04-11T12:55:00Z
7
value 0.00471
scoring_system epss
scoring_elements 0.64631
published_at 2026-04-12T12:55:00Z
8
value 0.00471
scoring_system epss
scoring_elements 0.64638
published_at 2026-04-16T12:55:00Z
9
value 0.00471
scoring_system epss
scoring_elements 0.6465
published_at 2026-04-18T12:55:00Z
10
value 0.00471
scoring_system epss
scoring_elements 0.64636
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-9809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1401880
reference_id 1401880
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1401880
9
reference_url https://security.gentoo.org/glsa/201705-10
reference_id GLSA-201705-10
reference_type
scores
url https://security.gentoo.org/glsa/201705-10
10
reference_url https://access.redhat.com/errata/RHSA-2017:0018
reference_id RHSA-2017:0018
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0018
11
reference_url https://access.redhat.com/errata/RHSA-2017:0021
reference_id RHSA-2017:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0021
fixed_packages
0
url pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
purl pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0?arch=x86_64&distroversion=v3.4&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0%3Farch=x86_64&distroversion=v3.4&reponame=main
aliases CVE-2016-9809
risk_score 1.4
exploitability 0.5
weighted_severity 2.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qync-5kha-4bgu
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/gst-plugins-bad1@1.8.3-r0%3Farch=x86_64&distroversion=v3.4&reponame=main