Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1035780?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1035780?format=api", "purl": "pkg:deb/debian/openvpn@2.3.4-5%2Bdeb8u2", "type": "deb", "namespace": "debian", "name": "openvpn", "version": "2.3.4-5+deb8u2", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.7.1-1~bpo13+1", "latest_non_vulnerable_version": "2.7.1-1~bpo13+1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94338?format=api", "vulnerability_id": "VCID-69y7-qv5p-gqar", "summary": "An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84976", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84967", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84881", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84911", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84928", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84922", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84945", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84941", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202004-16", "reference_id": "ASA-202004-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202004-16" }, { "reference_url": "https://security.archlinux.org/AVG-1135", "reference_id": "AVG-1135", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1135" }, { "reference_url": "https://usn.ubuntu.com/4933-1/", "reference_id": "USN-4933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4933-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051378?format=api", "purl": "pkg:deb/debian/openvpn@2.5.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-m93u-qysb-aqe8" }, { "vulnerability": "VCID-pndq-nwkn-cya3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.5.1-3" } ], "aliases": [ "CVE-2020-11810" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69y7-qv5p-gqar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93318?format=api", "vulnerability_id": "VCID-crrt-th9e-z3ay", "summary": "OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58977", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58859", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58933", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58956", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58922", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.5898", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58999", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58996", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58979", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58961", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479" }, { "reference_url": "https://security.archlinux.org/ASA-201705-16", "reference_id": "ASA-201705-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-16" }, { "reference_url": "https://security.archlinux.org/AVG-271", "reference_id": "AVG-271", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-271" }, { "reference_url": "https://usn.ubuntu.com/3284-1/", "reference_id": "USN-3284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3284-1/" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037380?format=api", "purl": "pkg:deb/debian/openvpn@2.4.0-6%2Bdeb9u1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.0-6%252Bdeb9u1~bpo8%252B1" } ], "aliases": [ "CVE-2017-7479" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crrt-th9e-z3ay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60884?format=api", "vulnerability_id": "VCID-faqk-wzr3-77be", "summary": "Multiple vulnerabilities have been discovered in OpenVPN, the worst of which could lead to information disclosure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65939", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65868", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65943", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65973", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65987", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68766", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68721", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68732", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68711", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.6876", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0547" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008015", "reference_id": "1008015", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008015" }, { "reference_url": "https://openvpn.net/community-downloads/", "reference_id": "community-downloads", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://openvpn.net/community-downloads/" }, { "reference_url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547", "reference_id": "CVE-2022-0547", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/", "reference_id": "GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/" }, { "reference_url": "https://security.gentoo.org/glsa/202409-08", "reference_id": "GLSA-202409-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-08" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/", "reference_id": "R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/" }, { "reference_url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements", "reference_id": "SecurityAnnouncements", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements" }, { "reference_url": "https://usn.ubuntu.com/5347-1/", "reference_id": "USN-5347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5347-1/" }, { "reference_url": "https://usn.ubuntu.com/6850-1/", "reference_id": "USN-6850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6850-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051379?format=api", "purl": "pkg:deb/debian/openvpn@2.6.3-1%2Bdeb12u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-m93u-qysb-aqe8" }, { "vulnerability": "VCID-pndq-nwkn-cya3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.6.3-1%252Bdeb12u4" } ], "aliases": [ "CVE-2022-0547" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-faqk-wzr3-77be" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96309?format=api", "vulnerability_id": "VCID-htt5-x61p-2qar", "summary": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.5153", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51539", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51591", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.5157", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51477", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51531", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51528", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51572", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51551", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5594" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074488", "reference_id": "1074488", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074488" }, { "reference_url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594", "reference_id": "CVE-2024-5594", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-06T16:56:30Z/" } ], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594" }, { "reference_url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", "reference_id": "msg07634.html", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-06T16:56:30Z/" } ], "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html" }, { "reference_url": "https://usn.ubuntu.com/6860-1/", "reference_id": "USN-6860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6860-1/" }, { "reference_url": "https://usn.ubuntu.com/7340-1/", "reference_id": "USN-7340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7340-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051379?format=api", "purl": "pkg:deb/debian/openvpn@2.6.3-1%2Bdeb12u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-m93u-qysb-aqe8" }, { "vulnerability": "VCID-pndq-nwkn-cya3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.6.3-1%252Bdeb12u4" } ], "aliases": [ "CVE-2024-5594" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-htt5-x61p-2qar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51948?format=api", "vulnerability_id": "VCID-j1d4-djxq-dqct", "summary": "A vulnerability has been found in OpenVPN, allowing attackers to\n bypass the authentication process.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15078", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56114", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56049", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56178", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56225", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56201", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56184", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.5622", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56189", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15078" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987380", "reference_id": "987380", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987380" }, { "reference_url": "https://security.archlinux.org/AVG-1861", "reference_id": "AVG-1861", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1861" }, { "reference_url": "https://security.gentoo.org/glsa/202105-25", "reference_id": "GLSA-202105-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202105-25" }, { "reference_url": "https://usn.ubuntu.com/4933-1/", "reference_id": "USN-4933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4933-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051378?format=api", "purl": "pkg:deb/debian/openvpn@2.5.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-m93u-qysb-aqe8" }, { "vulnerability": "VCID-pndq-nwkn-cya3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.5.1-3" } ], "aliases": [ "CVE-2020-15078" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j1d4-djxq-dqct" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72538?format=api", "vulnerability_id": "VCID-n8nh-wf64-8fgr", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7508.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7508.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58632", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58663", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58625", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58646", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58665", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58671", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5865", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:C" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037381?format=api", "purl": "pkg:deb/debian/openvpn@2.4.0-6%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.0-6%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050488?format=api", "purl": "pkg:deb/debian/openvpn@2.4.7-1%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.7-1%252Bdeb10u1" } ], "aliases": [ "CVE-2017-7508" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n8nh-wf64-8fgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84232?format=api", "vulnerability_id": "VCID-rkee-udq8-afg2", "summary": "openvpn: Multiple security issues fixed in OpenVPN 2.4.3 and 2.3.17", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7522.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66937", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66916", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66923", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.6686", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66902", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7522" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://security.archlinux.org/AVG-319", "reference_id": "AVG-319", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-319" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050488?format=api", "purl": "pkg:deb/debian/openvpn@2.4.7-1%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.7-1%252Bdeb10u1" } ], "aliases": [ "CVE-2017-7522" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rkee-udq8-afg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93082?format=api", "vulnerability_id": "VCID-ruzb-y7qd-nfgc", "summary": "OpenVPN versions before 2.3.3 and 2.4.x before 2.4.4 are vulnerable to a buffer overflow vulnerability when key-method 1 is used, possibly resulting in code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12166", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76975", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.77016", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.77009", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.82662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.82687", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.82682", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.82677", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.82715", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.82716", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.82626", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.8264", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.82636", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.8261", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01776", "scoring_system": "epss", "scoring_elements": "0.8267", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-12166" }, { "reference_url": "https://community.openvpn.net/openvpn/wiki/CVE-2017-12166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2017-12166" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12166", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12166" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, { "value": "10", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00002.html" }, { "reference_url": "http://www.securityfocus.com/bid/101153", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101153" }, { "reference_url": "http://www.securitytracker.com/id/1039470", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039470" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877089", "reference_id": "877089", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=877089" }, { "reference_url": "https://security.archlinux.org/ASA-201709-21", "reference_id": "ASA-201709-21", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201709-21" }, { "reference_url": "https://security.archlinux.org/AVG-420", "reference_id": "AVG-420", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-420" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openvpn:openvpn:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12166", "reference_id": "CVE-2017-12166", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" }, { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-12166" }, { "reference_url": "https://usn.ubuntu.com/7340-1/", "reference_id": "USN-7340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7340-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050488?format=api", "purl": "pkg:deb/debian/openvpn@2.4.7-1%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.7-1%252Bdeb10u1" } ], "aliases": [ "CVE-2017-12166" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ruzb-y7qd-nfgc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72542?format=api", "vulnerability_id": "VCID-vucu-2pfy-93ds", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7521.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7521.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42453", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63437", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63567", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63551", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.6357", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63497", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63559", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037381?format=api", "purl": "pkg:deb/debian/openvpn@2.4.0-6%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.0-6%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050488?format=api", "purl": "pkg:deb/debian/openvpn@2.4.7-1%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.7-1%252Bdeb10u1" } ], "aliases": [ "CVE-2017-7521" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vucu-2pfy-93ds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93317?format=api", "vulnerability_id": "VCID-wk2j-j9y1-5yhp", "summary": "OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89277", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89199", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89204", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89221", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89249", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89246", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89259", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89254", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89271", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478" }, { "reference_url": "https://security.archlinux.org/ASA-201705-16", "reference_id": "ASA-201705-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-16" }, { "reference_url": "https://security.archlinux.org/AVG-271", "reference_id": "AVG-271", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-271" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41993.py", "reference_id": "CVE-2017-7478", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41993.py" }, { "reference_url": "https://ostif.org/the-openvpn-2-4-0-audit-by-ostif-and-quarkslab-results/", "reference_id": "CVE-2017-7478", "reference_type": "exploit", "scores": [], "url": "https://ostif.org/the-openvpn-2-4-0-audit-by-ostif-and-quarkslab-results/" }, { "reference_url": "https://usn.ubuntu.com/3284-1/", "reference_id": "USN-3284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3284-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037380?format=api", "purl": "pkg:deb/debian/openvpn@2.4.0-6%2Bdeb9u1~bpo8%2B1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.0-6%252Bdeb9u1~bpo8%252B1" } ], "aliases": [ "CVE-2017-7478" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wk2j-j9y1-5yhp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72540?format=api", "vulnerability_id": "VCID-zuyu-zw1g-uqg7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7520.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54786", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75387", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7549", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7548", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75513", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7539", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75422", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75402", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75442", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75485", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:C" }, { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" }, { "reference_url": "https://usn.ubuntu.com/3339-2/", "reference_id": "USN-3339-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037381?format=api", "purl": "pkg:deb/debian/openvpn@2.4.0-6%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.0-6%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050488?format=api", "purl": "pkg:deb/debian/openvpn@2.4.7-1%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.7-1%252Bdeb10u1" } ], "aliases": [ "CVE-2017-7520" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zuyu-zw1g-uqg7" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72538?format=api", "vulnerability_id": "VCID-n8nh-wf64-8fgr", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7508.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7508.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58632", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58663", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58625", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58646", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58665", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58671", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5865", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:C" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035780?format=api", "purl": "pkg:deb/debian/openvpn@2.3.4-5%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-crrt-th9e-z3ay" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-wk2j-j9y1-5yhp" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.3.4-5%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037381?format=api", "purl": "pkg:deb/debian/openvpn@2.4.0-6%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.0-6%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050488?format=api", "purl": "pkg:deb/debian/openvpn@2.4.7-1%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.7-1%252Bdeb10u1" } ], "aliases": [ "CVE-2017-7508" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n8nh-wf64-8fgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72542?format=api", "vulnerability_id": "VCID-vucu-2pfy-93ds", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7521.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7521.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42453", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63437", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63567", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63551", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.6357", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63497", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63488", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63559", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035780?format=api", "purl": "pkg:deb/debian/openvpn@2.3.4-5%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-crrt-th9e-z3ay" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-wk2j-j9y1-5yhp" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.3.4-5%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037381?format=api", "purl": "pkg:deb/debian/openvpn@2.4.0-6%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.0-6%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050488?format=api", "purl": "pkg:deb/debian/openvpn@2.4.7-1%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.7-1%252Bdeb10u1" } ], "aliases": [ "CVE-2017-7521" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vucu-2pfy-93ds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72540?format=api", "vulnerability_id": "VCID-zuyu-zw1g-uqg7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7520.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54786", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75387", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7549", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7548", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75513", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7539", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75422", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75402", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75442", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75485", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:C" }, { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" }, { "reference_url": "https://usn.ubuntu.com/3339-2/", "reference_id": "USN-3339-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035780?format=api", "purl": "pkg:deb/debian/openvpn@2.3.4-5%2Bdeb8u2", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-crrt-th9e-z3ay" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-wk2j-j9y1-5yhp" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.3.4-5%252Bdeb8u2" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037381?format=api", "purl": "pkg:deb/debian/openvpn@2.4.0-6%2Bdeb9u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-ruzb-y7qd-nfgc" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.0-6%252Bdeb9u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050488?format=api", "purl": "pkg:deb/debian/openvpn@2.4.7-1%2Bdeb10u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-69y7-qv5p-gqar" }, { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-j1d4-djxq-dqct" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.4.7-1%252Bdeb10u1" } ], "aliases": [ "CVE-2017-7520" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zuyu-zw1g-uqg7" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.3.4-5%252Bdeb8u2" }