Lookup for vulnerable packages by Package URL.

Purlpkg:golang/github.com/docker/docker@1.6.1
Typegolang
Namespacegithub.com/docker
Namedocker
Version1.6.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4mf3-mmz6-2kfs
vulnerability_id VCID-4mf3-mmz6-2kfs
summary
Information Exposure in Docker Engine
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3630.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3630.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3630
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29471
published_at 2026-04-02T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29186
published_at 2026-04-24T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29301
published_at 2026-04-21T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29346
published_at 2026-04-18T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29372
published_at 2026-04-16T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.2935
published_at 2026-04-13T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29403
published_at 2026-04-12T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29448
published_at 2026-04-11T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29443
published_at 2026-04-09T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29405
published_at 2026-04-01T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.29402
published_at 2026-04-08T12:55:00Z
11
value 0.0011
scoring_system epss
scoring_elements 0.29338
published_at 2026-04-07T12:55:00Z
12
value 0.0011
scoring_system epss
scoring_elements 0.29519
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3630
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3630
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3630
3
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
4
reference_url https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660
5
reference_url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
6
reference_url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
7
reference_url https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3630
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3630
9
reference_url https://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
10
reference_url https://seclists.org/fulldisclosure/2015/May/28
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://seclists.org/fulldisclosure/2015/May/28
11
reference_url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3630
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3630
12
reference_url https://www.securityfocus.com/bid/74566
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.securityfocus.com/bid/74566
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1219063
reference_id 1219063
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1219063
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
reference_id 784726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
fixed_packages
0
url pkg:golang/github.com/docker/docker@1.6.1
purl pkg:golang/github.com/docker/docker@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/docker/docker@1.6.1
aliases CVE-2015-3630, GHSA-8fvr-5rqf-3wwh
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mf3-mmz6-2kfs
1
url VCID-6gxe-db4h-93ex
vulnerability_id VCID-6gxe-db4h-93ex
summary
Symlink Attack in Libcontainer and Docker Engine
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3627.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3627.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3627
reference_id
reference_type
scores
0
value 0.00105
scoring_system epss
scoring_elements 0.28317
published_at 2026-04-24T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28538
published_at 2026-04-08T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28578
published_at 2026-04-09T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.2858
published_at 2026-04-11T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28536
published_at 2026-04-12T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28487
published_at 2026-04-13T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28503
published_at 2026-04-16T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.2848
published_at 2026-04-18T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28432
published_at 2026-04-21T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28539
published_at 2026-04-01T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.28625
published_at 2026-04-02T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.2867
published_at 2026-04-04T12:55:00Z
12
value 0.00105
scoring_system epss
scoring_elements 0.28473
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3627
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3627
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3627
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.2
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:S/C:P/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba
5
reference_url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
6
reference_url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
7
reference_url https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3627
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3627
9
reference_url https://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
10
reference_url https://seclists.org/fulldisclosure/2015/May/28
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://seclists.org/fulldisclosure/2015/May/28
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1219061
reference_id 1219061
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1219061
12
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
reference_id 784726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
fixed_packages
0
url pkg:golang/github.com/docker/docker@1.6.1
purl pkg:golang/github.com/docker/docker@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/docker/docker@1.6.1
aliases CVE-2015-3627, GHSA-g7v2-2qxx-wjrw
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6gxe-db4h-93ex
2
url VCID-ksbt-33eq-93c9
vulnerability_id VCID-ksbt-33eq-93c9
summary
Arbitrary File Write in Libcontainer
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
1
reference_url http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3629.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3629.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3629
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39476
published_at 2026-04-16T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39425
published_at 2026-04-13T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39442
published_at 2026-04-12T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.3948
published_at 2026-04-11T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39469
published_at 2026-04-09T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39454
published_at 2026-04-08T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.3946
published_at 2026-04-02T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.3917
published_at 2026-04-24T12:55:00Z
8
value 0.00178
scoring_system epss
scoring_elements 0.39362
published_at 2026-04-21T12:55:00Z
9
value 0.00178
scoring_system epss
scoring_elements 0.39448
published_at 2026-04-18T12:55:00Z
10
value 0.00178
scoring_system epss
scoring_elements 0.39299
published_at 2026-04-01T12:55:00Z
11
value 0.00178
scoring_system epss
scoring_elements 0.39398
published_at 2026-04-07T12:55:00Z
12
value 0.00178
scoring_system epss
scoring_elements 0.39484
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3629
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3629
5
reference_url http://seclists.org/fulldisclosure/2015/May/28
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2015/May/28
6
reference_url https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba
7
reference_url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
8
reference_url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3629
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3629
10
reference_url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3629
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3629
11
reference_url http://www.securityfocus.com/bid/74558
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.securityfocus.com/bid/74558
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1219058
reference_id 1219058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1219058
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
reference_id 784726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
fixed_packages
0
url pkg:golang/github.com/docker/docker@1.6.1
purl pkg:golang/github.com/docker/docker@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/docker/docker@1.6.1
aliases CVE-2015-3629, GHSA-g44j-7vp3-68cv
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksbt-33eq-93c9
3
url VCID-nkhu-t2nh-s7b2
vulnerability_id VCID-nkhu-t2nh-s7b2
summary
Arbitrary File Override in Docker Engine
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.opensuse.org/opensuse-updates/2015-05/msg00023.html
1
reference_url http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://packetstormsecurity.com/files/131835/Docker-Privilege-Escalation-Information-Disclosure.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3631.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3631.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3631
reference_id
reference_type
scores
0
value 0.00143
scoring_system epss
scoring_elements 0.34345
published_at 2026-04-24T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.3447
published_at 2026-04-01T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34689
published_at 2026-04-02T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34715
published_at 2026-04-04T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34584
published_at 2026-04-07T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34627
published_at 2026-04-08T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34656
published_at 2026-04-09T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34659
published_at 2026-04-11T12:55:00Z
8
value 0.00143
scoring_system epss
scoring_elements 0.3462
published_at 2026-04-18T12:55:00Z
9
value 0.00143
scoring_system epss
scoring_elements 0.34596
published_at 2026-04-13T12:55:00Z
10
value 0.00143
scoring_system epss
scoring_elements 0.34635
published_at 2026-04-16T12:55:00Z
11
value 0.00143
scoring_system epss
scoring_elements 0.34581
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3631
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3631
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3631
5
reference_url http://seclists.org/fulldisclosure/2015/May/28
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url http://seclists.org/fulldisclosure/2015/May/28
6
reference_url https://github.com/moby/moby
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby
7
reference_url https://github.com/moby/moby/compare/769acfec2928c47a35da5357d854145b1036448d...b6a9dc399be31c531e3753104e10d74760ed75a2
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/moby/moby/compare/769acfec2928c47a35da5357d854145b1036448d...b6a9dc399be31c531e3753104e10d74760ed75a2
8
reference_url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#%21searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
9
reference_url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-3631
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2015-3631
11
reference_url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3631
reference_id
reference_type
scores
0
value 5.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-3631
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1219065
reference_id 1219065
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1219065
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
reference_id 784726
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784726
fixed_packages
0
url pkg:golang/github.com/docker/docker@1.6.1
purl pkg:golang/github.com/docker/docker@1.6.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:golang/github.com/docker/docker@1.6.1
aliases CVE-2015-3631, GHSA-v4h8-794j-g8mm
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkhu-t2nh-s7b2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:golang/github.com/docker/docker@1.6.1