Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/nginx@1.28.2-r0?arch=armv7&distroversion=v3.23&reponame=main
Typeapk
Namespacealpine
Namenginx
Version1.28.2-r0
Qualifiers
arch armv7
distroversion v3.23
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version1.28.3-r0
Latest_non_vulnerable_version1.28.3-r0
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-d1c6-dt2p-9kaa
vulnerability_id VCID-d1c6-dt2p-9kaa
summary SSL upstream injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1642.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1642.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1642
reference_id
reference_type
scores
0
value 0.00016
scoring_system epss
scoring_elements 0.03395
published_at 2026-04-02T12:55:00Z
1
value 0.00016
scoring_system epss
scoring_elements 0.03796
published_at 2026-04-13T12:55:00Z
2
value 0.00016
scoring_system epss
scoring_elements 0.03427
published_at 2026-04-08T12:55:00Z
3
value 0.00016
scoring_system epss
scoring_elements 0.03448
published_at 2026-04-09T12:55:00Z
4
value 0.00016
scoring_system epss
scoring_elements 0.03408
published_at 2026-04-11T12:55:00Z
5
value 0.00016
scoring_system epss
scoring_elements 0.03381
published_at 2026-04-12T12:55:00Z
6
value 0.00016
scoring_system epss
scoring_elements 0.03409
published_at 2026-04-04T12:55:00Z
7
value 0.00016
scoring_system epss
scoring_elements 0.03425
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1642
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1642
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000159824
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
1
value 8.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-04T16:01:47Z/
url https://my.f5.com/manage/s/article/K000159824
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127053
reference_id 1127053
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1127053
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2436738
reference_id 2436738
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2436738
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-1642
reference_id CVE-2026-1642
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2026-1642
8
reference_url https://access.redhat.com/errata/RHSA-2026:3638
reference_id RHSA-2026:3638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:3638
9
reference_url https://access.redhat.com/errata/RHSA-2026:4235
reference_id RHSA-2026:4235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4235
10
reference_url https://access.redhat.com/errata/RHSA-2026:4501
reference_id RHSA-2026:4501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4501
11
reference_url https://access.redhat.com/errata/RHSA-2026:4705
reference_id RHSA-2026:4705
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4705
12
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:4943
13
reference_url https://access.redhat.com/errata/RHSA-2026:5581
reference_id RHSA-2026:5581
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5581
14
reference_url https://access.redhat.com/errata/RHSA-2026:5599
reference_id RHSA-2026:5599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:5599
15
reference_url https://access.redhat.com/errata/RHSA-2026:6182
reference_id RHSA-2026:6182
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6182
16
reference_url https://access.redhat.com/errata/RHSA-2026:6234
reference_id RHSA-2026:6234
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6234
17
reference_url https://access.redhat.com/errata/RHSA-2026:6235
reference_id RHSA-2026:6235
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6235
18
reference_url https://access.redhat.com/errata/RHSA-2026:6302
reference_id RHSA-2026:6302
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6302
19
reference_url https://access.redhat.com/errata/RHSA-2026:6311
reference_id RHSA-2026:6311
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6311
20
reference_url https://access.redhat.com/errata/RHSA-2026:6407
reference_id RHSA-2026:6407
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6407
21
reference_url https://access.redhat.com/errata/RHSA-2026:6408
reference_id RHSA-2026:6408
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6408
22
reference_url https://access.redhat.com/errata/RHSA-2026:6427
reference_id RHSA-2026:6427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:6427
23
reference_url https://usn.ubuntu.com/8038-1/
reference_id USN-8038-1
reference_type
scores
url https://usn.ubuntu.com/8038-1/
fixed_packages
0
url pkg:apk/alpine/nginx@1.28.2-r0?arch=armv7&distroversion=v3.23&reponame=main
purl pkg:apk/alpine/nginx@1.28.2-r0?arch=armv7&distroversion=v3.23&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nginx@1.28.2-r0%3Farch=armv7&distroversion=v3.23&reponame=main
aliases CVE-2026-1642
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d1c6-dt2p-9kaa
1
url VCID-hemy-pnpj-sfg3
vulnerability_id VCID-hemy-pnpj-sfg3
summary Buffer overread in the ngx_mail_smtp_module
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53859.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-53859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-53859
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06024
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06102
published_at 2026-04-13T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06084
published_at 2026-04-08T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06123
published_at 2026-04-09T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06114
published_at 2026-04-11T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06109
published_at 2026-04-12T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06059
published_at 2026-04-04T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06044
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-53859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53859
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://my.f5.com/manage/s/article/K000152786
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-13T15:06:23Z/
url https://my.f5.com/manage/s/article/K000152786
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111138
reference_id 1111138
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1111138
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2388238
reference_id 2388238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2388238
7
reference_url https://nvd.nist.gov/vuln/detail/CVE-2025-53859
reference_id CVE-2025-53859
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2025-53859
8
reference_url https://usn.ubuntu.com/7715-1/
reference_id USN-7715-1
reference_type
scores
url https://usn.ubuntu.com/7715-1/
fixed_packages
0
url pkg:apk/alpine/nginx@1.28.2-r0?arch=armv7&distroversion=v3.23&reponame=main
purl pkg:apk/alpine/nginx@1.28.2-r0?arch=armv7&distroversion=v3.23&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/nginx@1.28.2-r0%3Farch=armv7&distroversion=v3.23&reponame=main
aliases CVE-2025-53859
risk_score 1.6
exploitability 0.5
weighted_severity 3.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hemy-pnpj-sfg3
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/nginx@1.28.2-r0%3Farch=armv7&distroversion=v3.23&reponame=main