Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64@1.0.12-1.Final_redhat_00001.1?arch=el6eap
Typerpm
Namespaceredhat
Nameeap7-wildfly-openssl-linux-x86_64
Version1.0.12-1.Final_redhat_00001.1
Qualifiers
arch el6eap
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-9v3p-qkzz-ukgg
vulnerability_id VCID-9v3p-qkzz-ukgg
summary
Wildfly-OpenSSL memory leak flaw
A memory leak flaw was found in WildFly OpenSSL in versions prior to 1.1.3.Final, where it removes an HTTP session. It may allow the attacker to cause OOM leading to a denial of service. The highest threat from this vulnerability is to system availability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25644.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25644
reference_id
reference_type
scores
0
value 0.00465
scoring_system epss
scoring_elements 0.64386
published_at 2026-04-18T12:55:00Z
1
value 0.00465
scoring_system epss
scoring_elements 0.64379
published_at 2026-04-11T12:55:00Z
2
value 0.00465
scoring_system epss
scoring_elements 0.64374
published_at 2026-04-16T12:55:00Z
3
value 0.00465
scoring_system epss
scoring_elements 0.64338
published_at 2026-04-13T12:55:00Z
4
value 0.00465
scoring_system epss
scoring_elements 0.64261
published_at 2026-04-01T12:55:00Z
5
value 0.00465
scoring_system epss
scoring_elements 0.64318
published_at 2026-04-02T12:55:00Z
6
value 0.00465
scoring_system epss
scoring_elements 0.64346
published_at 2026-04-04T12:55:00Z
7
value 0.00465
scoring_system epss
scoring_elements 0.64304
published_at 2026-04-07T12:55:00Z
8
value 0.00465
scoring_system epss
scoring_elements 0.64352
published_at 2026-04-08T12:55:00Z
9
value 0.00465
scoring_system epss
scoring_elements 0.64367
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25644
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1885485
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1885485
3
reference_url https://github.com/wildfly-security/wildfly-openssl-natives
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/wildfly-security/wildfly-openssl-natives
4
reference_url https://github.com/wildfly-security/wildfly-openssl-natives/commit/7c26514676f3fb0dee0bcaa7d4680f982372950f
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/wildfly-security/wildfly-openssl-natives/commit/7c26514676f3fb0dee0bcaa7d4680f982372950f
5
reference_url https://github.com/wildfly-security/wildfly-openssl-natives/pull/4
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/wildfly-security/wildfly-openssl-natives/pull/4
6
reference_url https://github.com/wildfly-security/wildfly-openssl-natives/pull/4/commits/7c26514676f3fb0dee0bcaa7d4680f982372950f
reference_id
reference_type
scores
url https://github.com/wildfly-security/wildfly-openssl-natives/pull/4/commits/7c26514676f3fb0dee0bcaa7d4680f982372950f
7
reference_url https://github.com/wildfly-security/wildfly-openssl-natives/pull/4/files
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/wildfly-security/wildfly-openssl-natives/pull/4/files
8
reference_url https://issues.redhat.com/browse/WFSSL-51
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/WFSSL-51
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-25644
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-25644
10
reference_url https://security.netapp.com/advisory/ntap-20201016-0004
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20201016-0004
11
reference_url https://security.netapp.com/advisory/ntap-20201016-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20201016-0004/
12
reference_url https://github.com/advisories/GHSA-hxj4-885f-grgp
reference_id GHSA-hxj4-885f-grgp
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hxj4-885f-grgp
13
reference_url https://access.redhat.com/errata/RHSA-2020:4256
reference_id RHSA-2020:4256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4256
14
reference_url https://access.redhat.com/errata/RHSA-2020:4257
reference_id RHSA-2020:4257
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4257
15
reference_url https://access.redhat.com/errata/RHSA-2020:4922
reference_id RHSA-2020:4922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4922
16
reference_url https://access.redhat.com/errata/RHSA-2020:4923
reference_id RHSA-2020:4923
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4923
17
reference_url https://access.redhat.com/errata/RHSA-2020:4978
reference_id RHSA-2020:4978
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4978
18
reference_url https://access.redhat.com/errata/RHSA-2020:5340
reference_id RHSA-2020:5340
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5340
19
reference_url https://access.redhat.com/errata/RHSA-2020:5341
reference_id RHSA-2020:5341
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5341
20
reference_url https://access.redhat.com/errata/RHSA-2020:5342
reference_id RHSA-2020:5342
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5342
21
reference_url https://access.redhat.com/errata/RHSA-2020:5344
reference_id RHSA-2020:5344
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5344
22
reference_url https://access.redhat.com/errata/RHSA-2020:5410
reference_id RHSA-2020:5410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5410
23
reference_url https://access.redhat.com/errata/RHSA-2021:0433
reference_id RHSA-2021:0433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0433
fixed_packages
aliases CVE-2020-25644, GHSA-hxj4-885f-grgp
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9v3p-qkzz-ukgg
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/eap7-wildfly-openssl-linux-x86_64@1.0.12-1.Final_redhat_00001.1%3Farch=el6eap