Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1037146?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "type": "deb", "namespace": "debian", "name": "openssl", "version": "1.1.0l-1~deb9u1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "3.0.14-1~deb12u1", "latest_non_vulnerable_version": "4.0.0~alpha1-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11082?format=api", "vulnerability_id": "VCID-1mkj-94qc-zqgn", "summary": "Buffer Overflow\nIn order to decrypt SM2 encrypted data an application is expected to call the API function `EVP_PKEY_decrypt()`. Typically an application will call this function twice. The first time, on entry, the `out` parameter can be NULL and, on exit, the `outlen` parameter is populated with the buffer size required to hold the decrypted plaintext. The application can then allocate a sufficiently sized buffer and call `EVP_PKEY_decrypt()` again, but this time passing a non-NULL value for the `out` parameter. A bug in the implementation of the SM2 decryption code means that the calculation of the buffer size required to hold the plaintext returned by the first call to `EVP_PKEY_decrypt()` can be smaller than the actual size required by the second call. This can lead to a buffer overflow when `EVP_PKEY_decrypt()` is called by the application a second time with a buffer that is too small. A malicious attacker who is able present SM2 content for decryption to an application could cause attacker chosen data to overflow the buffer by up to a maximum of bytes altering the contents of other data held after the buffer, possibly changing application behaviour or causing the application to crash. The location of the buffer is application dependent but is typically heap allocated.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3711.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3711.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3711", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02293", "scoring_system": "epss", "scoring_elements": "0.84702", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02293", "scoring_system": "epss", "scoring_elements": "0.84644", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02293", "scoring_system": "epss", "scoring_elements": "0.8468", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02293", "scoring_system": "epss", "scoring_elements": "0.84679", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02293", "scoring_system": "epss", "scoring_elements": "0.84658", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02544", "scoring_system": "epss", "scoring_elements": "0.85475", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02544", "scoring_system": "epss", "scoring_elements": "0.85476", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02544", "scoring_system": "epss", "scoring_elements": "0.85462", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02544", "scoring_system": "epss", "scoring_elements": "0.85471", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3711" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=59f5e75f3bced8fc0e130d72a3f582cf7b480b46" }, { "reference_url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0097.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0097.html" }, { "reference_url": "https://security.gentoo.org/glsa/202209-02", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210827-0010", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210827-0010" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20211022-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20211022-0003" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4963", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "reference_url": "https://www.openssl.org/news/secadv/20210824.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "reference_url": "https://www.tenable.com/security/tns-2021-16", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-16" }, { "reference_url": "https://www.tenable.com/security/tns-2022-02", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2022-02" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/08/26/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623", "reference_id": "1995623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995623" }, { "reference_url": "https://security.archlinux.org/AVG-2315", "reference_id": "AVG-2315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2315" }, { "reference_url": "https://security.archlinux.org/AVG-2316", "reference_id": "AVG-2316", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2316" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711", "reference_id": "CVE-2021-3711", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3711" }, { "reference_url": "https://github.com/advisories/GHSA-5ww6-px42-wc85", "reference_id": "GHSA-5ww6-px42-wc85", "reference_type": "", "scores": [ { "value": "CRITICAL", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-5ww6-px42-wc85" }, { "reference_url": "https://security.gentoo.org/glsa/202210-02", "reference_id": "GLSA-202210-02", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "CRITICAL", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "reference_url": "https://usn.ubuntu.com/5051-1/", "reference_id": "USN-5051-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5051-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2021-3711", "GHSA-5ww6-px42-wc85" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1mkj-94qc-zqgn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48385?format=api", "vulnerability_id": "VCID-3s4f-e116-j7d7", "summary": "A vulnerability in OpenSSL might allow remote attackers to cause a\n Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1543" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0732.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0732.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99021", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99031", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99025", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99026", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99029", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0732" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/" }, { "reference_url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20181105-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20181105-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190118-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190118-0002/" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4348" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4355" }, { "reference_url": "https://www.openssl.org/news/secadv/20180612.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20180612.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://www.tenable.com/security/tns-2018-12", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-12" }, { "reference_url": "https://www.tenable.com/security/tns-2018-13", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-13" }, { "reference_url": "https://www.tenable.com/security/tns-2018-14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-14" }, { "reference_url": "https://www.tenable.com/security/tns-2018-17", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-17" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "reference_url": "http://www.securityfocus.com/bid/104442", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104442" }, { "reference_url": "http://www.securitytracker.com/id/1041090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041090" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", "reference_id": "1591100", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100" }, { "reference_url": "https://security.archlinux.org/AVG-674", "reference_id": "AVG-674", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-674" }, { "reference_url": "https://security.archlinux.org/AVG-675", "reference_id": "AVG-675", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-675" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", "reference_id": "CVE-2018-0732", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732" }, { "reference_url": "https://security.gentoo.org/glsa/201811-03", "reference_id": "GLSA-201811-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2552", "reference_id": "RHSA-2018:2552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2553", "reference_id": "RHSA-2018:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3221", "reference_id": "RHSA-2018:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1296", "reference_id": "RHSA-2019:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1297", "reference_id": "RHSA-2019:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1297" }, { "reference_url": "https://usn.ubuntu.com/3692-1/", "reference_id": "USN-3692-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3692-1/" }, { "reference_url": "https://usn.ubuntu.com/3692-2/", "reference_id": "USN-3692-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3692-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2018-0732" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3s4f-e116-j7d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16962?format=api", "vulnerability_id": "VCID-5bn8-6xa9-fqe4", "summary": "Improper Certificate Validation\nApplications that use a non-default option when verifying certificates may be vulnerable to an attack from a malicious CA to circumvent certain checks. Invalid certificate policies in leaf certificates are silently ignored by OpenSSL and other certificate policy checks are skipped for that certificate. A malicious CA could use this to deliberately assert invalid certificate policies in order to circumvent policy checking on the certificate altogether. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0465.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0465.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0465", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.6356", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.6362", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63552", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63621", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00449", "scoring_system": "epss", "scoring_elements": "0.63636", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T20:12:09Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=10325176f3d3e98c6e2b3bf5ab1e3b334de6947a" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T20:12:09Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1dd43e0709fece299b15208f36cc7c76209ba0bb" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T20:12:09Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=b013765abfa80036dc779dd0e50602c57bb3bf95" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T20:12:09Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=facfb1ab745646e97a1920977ae4a9965ea61d5c" }, { "reference_url": "https://www.openssl.org/news/secadv/20230328.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T20:12:09Z/" } ], "url": "https://www.openssl.org/news/secadv/20230328.txt" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034720", "reference_id": "1034720", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034720" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182561", "reference_id": "2182561", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182561" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0465", "reference_id": "CVE-2023-0465", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0465" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T20:12:09Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230414-0001/", "reference_id": "ntap-20230414-0001", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-18T20:12:09Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230414-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3722", "reference_id": "RHSA-2023:3722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7622", "reference_id": "RHSA-2023:7622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7623", "reference_id": "RHSA-2023:7623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625", "reference_id": "RHSA-2023:7625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626", "reference_id": "RHSA-2023:7626", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7626" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2023-0465" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5bn8-6xa9-fqe4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79247?format=api", "vulnerability_id": "VCID-5t48-q1g9-53be", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03572", "scoring_system": "epss", "scoring_elements": "0.87727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03572", "scoring_system": "epss", "scoring_elements": "0.87735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03572", "scoring_system": "epss", "scoring_elements": "0.87729", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88098", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88106", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88129", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ee22257b1418438ebaf54df98af4e24f494d1809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ee22257b1418438ebaf54df98af4e24f494d1809" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f426625b6ae9a7831010750490a5f0ad689c5ba3", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f426625b6ae9a7831010750490a5f0ad689c5ba3" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jul/3", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jul/3" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4475" }, { "reference_url": "https://www.openssl.org/news/secadv/20190306.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20190306.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695954", "reference_id": "1695954", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695954" }, { "reference_url": "https://security.archlinux.org/ASA-201906-6", "reference_id": "ASA-201906-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201906-6" }, { "reference_url": "https://security.archlinux.org/ASA-201906-7", "reference_id": "ASA-201906-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201906-7" }, { "reference_url": "https://security.archlinux.org/AVG-919", "reference_id": "AVG-919", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-919" }, { "reference_url": "https://security.archlinux.org/AVG-920", "reference_id": "AVG-920", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-920" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1543", "reference_id": "CVE-2019-1543", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3700", "reference_id": "RHSA-2019:3700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3700" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2019-1543" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5t48-q1g9-53be" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64853?format=api", "vulnerability_id": "VCID-6mua-rkdu-87ay", "summary": "openssl: OpenSSL: Denial of Service due to out-of-bounds write in BIO filter", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68160.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-68160.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-68160", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06359", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06326", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07798", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07753", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07812", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07829", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07824", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07811", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-68160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://openssl-library.org/news/secadv/20260127.txt", "reference_id": "20260127.txt", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:04:54Z/" } ], "url": "https://openssl-library.org/news/secadv/20260127.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430380", "reference_id": "2430380", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430380" }, { "reference_url": "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad", "reference_id": "384011202af92605d926fafe4a0bcd6b65d162ad", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:04:54Z/" } ], "url": "https://github.com/openssl/openssl/commit/384011202af92605d926fafe4a0bcd6b65d162ad" }, { "reference_url": "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6", "reference_id": "475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:04:54Z/" } ], "url": "https://github.com/openssl/openssl/commit/475c466ef2fbd8fc1df6fae1c3eed9c813fc8ff6" }, { "reference_url": "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c", "reference_id": "4c96fbba618e1940f038012506ee9e21d32ee12c", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:04:54Z/" } ], "url": "https://github.com/openssl/openssl/commit/4c96fbba618e1940f038012506ee9e21d32ee12c" }, { "reference_url": "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0", "reference_id": "6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:04:54Z/" } ], "url": "https://github.com/openssl/openssl/commit/6845c3b6460a98b1ec4e463baa2ea1a63a32d7c0" }, { "reference_url": "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096", "reference_id": "68a7cd2e2816c3a02f4d45a2ce43fc04fac97096", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:04:54Z/" } ], "url": "https://github.com/openssl/openssl/commit/68a7cd2e2816c3a02f4d45a2ce43fc04fac97096" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1472", "reference_id": "RHSA-2026:1472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1473", "reference_id": "RHSA-2026:1473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1736", "reference_id": "RHSA-2026:1736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485", "reference_id": "RHSA-2026:2485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563", "reference_id": "RHSA-2026:2563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3228", "reference_id": "RHSA-2026:3228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943", "reference_id": "RHSA-2026:4943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4943" }, { "reference_url": "https://usn.ubuntu.com/7980-1/", "reference_id": "USN-7980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-1/" }, { "reference_url": "https://usn.ubuntu.com/7980-2/", "reference_id": "USN-7980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2025-68160" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6mua-rkdu-87ay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39444?format=api", "vulnerability_id": "VCID-6ptm-71xf-eqgp", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which could allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23840.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.70013", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.70026", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.70041", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.70018", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.70001", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.69953", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.69976", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.69962", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00619", "scoring_system": "epss", "scoring_elements": "0.69949", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23840" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/alexcrichton/openssl-src-rs", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/alexcrichton/openssl-src-rs" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "reference_url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23840" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0057.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0057.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0009", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0009" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0009/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4855", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2021/dsa-4855" }, { "reference_url": "https://www.openssl.org/news/secadv/20210216.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "reference_url": "https://www.tenable.com/security/tns-2021-03", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-03" }, { "reference_url": "https://www.tenable.com/security/tns-2021-09", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-09" }, { "reference_url": "https://www.tenable.com/security/tns-2021-10", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-10" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324", "reference_id": "1930324", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930324" }, { "reference_url": "https://security.archlinux.org/ASA-202102-42", "reference_id": "ASA-202102-42", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-42" }, { "reference_url": "https://security.archlinux.org/AVG-1581", "reference_id": "AVG-1581", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1581" }, { "reference_url": "https://security.archlinux.org/AVG-1605", "reference_id": "AVG-1605", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1605" }, { "reference_url": "https://github.com/advisories/GHSA-qgm6-9472-pwq7", "reference_id": "GHSA-qgm6-9472-pwq7", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-qgm6-9472-pwq7" }, { "reference_url": "https://security.gentoo.org/glsa/202103-03", "reference_id": "GLSA-202103-03", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202103-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3798", "reference_id": "RHSA-2021:3798", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3798" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4198", "reference_id": "RHSA-2021:4198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4424", "reference_id": "RHSA-2021:4424", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4613", "reference_id": "RHSA-2021:4613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4614", "reference_id": "RHSA-2021:4614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4861", "reference_id": "RHSA-2021:4861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4863", "reference_id": "RHSA-2021:4863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4863" }, { "reference_url": "https://usn.ubuntu.com/4738-1/", "reference_id": "USN-4738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4738-1/" }, { "reference_url": "https://usn.ubuntu.com/5088-1/", "reference_id": "USN-5088-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5088-1/" }, { "reference_url": "https://usn.ubuntu.com/7018-1/", "reference_id": "USN-7018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7018-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2021-23840", "GHSA-qgm6-9472-pwq7" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6ptm-71xf-eqgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64859?format=api", "vulnerability_id": "VCID-7xwq-vdej-ayg1", "summary": "openssl: OpenSSL: Denial of Service via type confusion in PKCS#7 signature verification", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22796.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22796.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-22796", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29759", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29708", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30333", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30329", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30423", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30425", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00117", "scoring_system": "epss", "scoring_elements": "0.30381", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-22796" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://openssl-library.org/news/secadv/20260127.txt", "reference_id": "20260127.txt", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:27:50Z/" } ], "url": "https://openssl-library.org/news/secadv/20260127.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430390", "reference_id": "2430390", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430390" }, { "reference_url": "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4", "reference_id": "2502e7b7d4c0cf4f972a881641fe09edc67aeec4", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:27:50Z/" } ], "url": "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4" }, { "reference_url": "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49", "reference_id": "572844beca95068394c916626a6d3a490f831a49", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:27:50Z/" } ], "url": "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49" }, { "reference_url": "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12", "reference_id": "7bbca05be55b129651d9df4bdb92becc45002c12", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:27:50Z/" } ], "url": "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12" }, { "reference_url": "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e", "reference_id": "eeee3cbd4d682095ed431052f00403004596373e", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:27:50Z/" } ], "url": "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e" }, { "reference_url": "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2", "reference_id": "ef2fb66ec571564d64d1c74a12e388a2a54d05d2", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-27T16:27:50Z/" } ], "url": "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1472", "reference_id": "RHSA-2026:1472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1473", "reference_id": "RHSA-2026:1473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1736", "reference_id": "RHSA-2026:1736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485", "reference_id": "RHSA-2026:2485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563", "reference_id": "RHSA-2026:2563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3228", "reference_id": "RHSA-2026:3228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943", "reference_id": "RHSA-2026:4943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4943" }, { "reference_url": "https://usn.ubuntu.com/7980-1/", "reference_id": "USN-7980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-1/" }, { "reference_url": "https://usn.ubuntu.com/7980-2/", "reference_id": "USN-7980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2026-22796" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7xwq-vdej-ayg1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73027?format=api", "vulnerability_id": "VCID-7ygr-6dqp-m3hh", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0734.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0734.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90692", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.9073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90736", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90745", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90698", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90709", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90719", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364", "reference_id": "1644364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364" }, { "reference_url": "https://security.archlinux.org/ASA-201812-5", "reference_id": "ASA-201812-5", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-5" }, { "reference_url": "https://security.archlinux.org/ASA-201812-6", "reference_id": "ASA-201812-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-6" }, { "reference_url": "https://security.archlinux.org/AVG-792", "reference_id": "AVG-792", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-792" }, { "reference_url": "https://security.archlinux.org/AVG-793", "reference_id": "AVG-793", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2304", "reference_id": "RHSA-2019:2304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3700", "reference_id": "RHSA-2019:3700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3932", "reference_id": "RHSA-2019:3932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3933", "reference_id": "RHSA-2019:3933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3935", "reference_id": "RHSA-2019:3935", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "reference_url": "https://usn.ubuntu.com/3840-1/", "reference_id": "USN-3840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3840-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2018-0734" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ygr-6dqp-m3hh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39184?format=api", "vulnerability_id": "VCID-88p4-kcyt-fbck", "summary": "Multiple information disclosure vulnerabilities in OpenSSL allow\n attackers to obtain sensitive information.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" }, { "reference_url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49324", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.4935", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49306", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49347", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49374", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.4936", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49351", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1547" }, { "reference_url": "https://arxiv.org/abs/1909.01785", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://arxiv.org/abs/1909.01785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/0", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://seclists.org/bugtraq/2019/Oct/0" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://seclists.org/bugtraq/2019/Oct/1" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/25", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://seclists.org/bugtraq/2019/Sep/25" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190919-0002/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20190919-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200122-0002/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20200122-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20200416-0003/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0006/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "reference_url": "https://support.f5.com/csp/article/K73422160?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://support.f5.com/csp/article/K73422160?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4539", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.debian.org/security/2019/dsa-4539" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4540", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.debian.org/security/2019/dsa-4540" }, { "reference_url": "https://www.openssl.org/news/secadv/20190910.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.openssl.org/news/secadv/20190910.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://www.tenable.com/security/tns-2019-08", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.tenable.com/security/tns-2019-08" }, { "reference_url": "https://www.tenable.com/security/tns-2019-09", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.tenable.com/security/tns-2019-09" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752090", "reference_id": "1752090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752090" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1547", "reference_id": "CVE-2019-1547", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1547" }, { "reference_url": "https://security.gentoo.org/glsa/201911-04", "reference_id": "GLSA-201911-04", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.gentoo.org/glsa/201911-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1336", "reference_id": "RHSA-2020:1336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1337", "reference_id": "RHSA-2020:1337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1840", "reference_id": "RHSA-2020:1840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1840" }, { "reference_url": "https://usn.ubuntu.com/4376-1/", "reference_id": "USN-4376-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://usn.ubuntu.com/4376-1/" }, { "reference_url": "https://usn.ubuntu.com/4376-2/", "reference_id": "USN-4376-2", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://usn.ubuntu.com/4376-2/" }, { "reference_url": "https://usn.ubuntu.com/4504-1/", "reference_id": "USN-4504-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://usn.ubuntu.com/4504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2019-1547" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88p4-kcyt-fbck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/17765?format=api", "vulnerability_id": "VCID-8uhr-19zz-n3b7", "summary": "Allocation of Resources Without Limits or Throttling\nIssue summary: Processing some specially crafted ASN.1 object identifiers or\ndata containing them may be very slow.\n\nImpact summary: Applications that use OBJ_obj2txt() directly, or use any of\nthe OpenSSL subsystems OCSP, PKCS7/SMIME, CMS, CMP/CRMF or TS with no message\nsize limit may experience notable to very long delays when processing those\nmessages, which may lead to a Denial of Service.\n\nAn OBJECT IDENTIFIER is composed of a series of numbers - sub-identifiers -\nmost of which have no size limit. OBJ_obj2txt() may be used to translate\nan ASN.1 OBJECT IDENTIFIER given in DER encoding form (using the OpenSSL\ntype ASN1_OBJECT) to its canonical numeric text form, which are the\nsub-identifiers of the OBJECT IDENTIFIER in decimal form, separated by\nperiods.\n\nWhen one of the sub-identifiers in the OBJECT IDENTIFIER is very large\n(these are sizes that are seen as absurdly large, taking up tens or hundreds\nof KiBs), the translation to a decimal number in text may take a very long\ntime. The time complexity is O(n^2) with 'n' being the size of the\nsub-identifiers in bytes (*).\n\nWith OpenSSL 3.0, support to fetch cryptographic algorithms using names /\nidentifiers in string form was introduced. This includes using OBJECT\nIDENTIFIERs in canonical numeric text form as identifiers for fetching\nalgorithms.\n\nSuch OBJECT IDENTIFIERs may be received through the ASN.1 structure\nAlgorithmIdentifier, which is commonly used in multiple protocols to specify\nwhat cryptographic algorithm should be used to sign or verify, encrypt or\ndecrypt, or digest passed data.\n\nApplications that call OBJ_obj2txt() directly with untrusted data are\naffected, with any version of OpenSSL. If the use is for the mere purpose\nof display, the severity is considered low.\n\nIn OpenSSL 3.0 and newer, this affects the subsystems OCSP, PKCS7/SMIME,\nCMS, CMP/CRMF or TS. It also impacts anything that processes X.509\ncertificates, including simple things like verifying its signature.\n\nThe impact on TLS is relatively low, because all versions of OpenSSL have a\n100KiB limit on the peer's certificate chain. Additionally, this only\nimpacts clients, or servers that have explicitly enabled client\nauthentication.\n\nIn OpenSSL 1.1.1 and 1.0.2, this only affects displaying diverse objects,\nsuch as X.509 certificates. This is assumed to not happen in such a way\nthat it would cause a Denial of Service, so these versions are considered\nnot affected by this issue in such a way that it would be cause for concern,\nand the severity is therefore considered low.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2650.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2650.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2650", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.92003", "scoring_system": "epss", "scoring_elements": "0.99696", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.92003", "scoring_system": "epss", "scoring_elements": "0.99701", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.92003", "scoring_system": "epss", "scoring_elements": "0.99697", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.92003", "scoring_system": "epss", "scoring_elements": "0.99698", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.92003", "scoring_system": "epss", "scoring_elements": "0.99699", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.92003", "scoring_system": "epss", "scoring_elements": "0.997", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2650" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=423a2bc737a908ad0c77bda470b2b59dc879936b" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=853c5e56ee0b8650c73140816bb8b91d6163422c" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9e209944b35cf82368071f160a744b6178f9b098", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9e209944b35cf82368071f160a744b6178f9b098" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db779b0e10b047f2585615e0b8f2acdf21f8544a", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db779b0e10b047f2585615e0b8f2acdf21f8544a" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5417", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5417" }, { "reference_url": "https://www.openssl.org/news/secadv/20230530.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://www.openssl.org/news/secadv/20230530.txt" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/05/30/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "http://www.openwall.com/lists/oss-security/2023/05/30/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207947", "reference_id": "2207947", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207947" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2650", "reference_id": "CVE-2023-2650", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2650" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230703-0001/", "reference_id": "ntap-20230703-0001", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230703-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20231027-0009/", "reference_id": "ntap-20231027-0009", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20231027-0009/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3722", "reference_id": "RHSA-2023:3722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6330", "reference_id": "RHSA-2023:6330", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7622", "reference_id": "RHSA-2023:7622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7623", "reference_id": "RHSA-2023:7623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625", "reference_id": "RHSA-2023:7625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626", "reference_id": "RHSA-2023:7626", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7626" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009", "reference_id": "SNWLID-2023-0009", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:48Z/" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0009" }, { "reference_url": "https://usn.ubuntu.com/6119-1/", "reference_id": "USN-6119-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6119-1/" }, { "reference_url": "https://usn.ubuntu.com/6188-1/", "reference_id": "USN-6188-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6188-1/" }, { "reference_url": "https://usn.ubuntu.com/6672-1/", "reference_id": "USN-6672-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6672-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2023-2650" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8uhr-19zz-n3b7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79331?format=api", "vulnerability_id": "VCID-95ub-7a6n-afdg", "summary": "openssl: the c_rehash script allows command injection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2068.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2068.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2068", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1858", "scoring_system": "epss", "scoring_elements": "0.95258", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.1858", "scoring_system": "epss", "scoring_elements": "0.95233", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.1858", "scoring_system": "epss", "scoring_elements": "0.95235", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.1858", "scoring_system": "epss", "scoring_elements": "0.95239", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.1858", "scoring_system": "epss", "scoring_elements": "0.95247", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.1858", "scoring_system": "epss", "scoring_elements": "0.9525", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.1858", "scoring_system": "epss", "scoring_elements": "0.95255", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.1858", "scoring_system": "epss", "scoring_elements": "0.95256", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2068" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2068" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c9c35870601b4a44d86ddbf512b38df38285cfa" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9639817dac8bbbaa64d09efad7464ccc405527c7" }, { "reference_url": "https://www.openssl.org/news/secadv/20220621.txt", "reference_id": "20220621.txt", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/" } ], "url": "https://www.openssl.org/news/secadv/20220621.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097310", "reference_id": "2097310", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2097310" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WZZBKUHQFGSKGNXXKICSRPL7AMVW5M5/", "reference_id": "6WZZBKUHQFGSKGNXXKICSRPL7AMVW5M5", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WZZBKUHQFGSKGNXXKICSRPL7AMVW5M5/" }, { "reference_url": "https://security.archlinux.org/AVG-2765", "reference_id": "AVG-2765", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2765" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2068", "reference_id": "CVE-2022-2068", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2068" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5169", "reference_id": "dsa-5169", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5169" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220707-0008/", "reference_id": "ntap-20220707-0008", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220707-0008/" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2c9c35870601b4a44d86ddbf512b38df38285cfa", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=2c9c35870601b4a44d86ddbf512b38df38285cfa", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=2c9c35870601b4a44d86ddbf512b38df38285cfa" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7a9c027159fe9e1bbc2cd38a8a2914bff0d5abd9" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9639817dac8bbbaa64d09efad7464ccc405527c7", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=9639817dac8bbbaa64d09efad7464ccc405527c7", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=9639817dac8bbbaa64d09efad7464ccc405527c7" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5818", "reference_id": "RHSA-2022:5818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6224", "reference_id": "RHSA-2022:6224", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6224" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840", "reference_id": "RHSA-2022:8840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841", "reference_id": "RHSA-2022:8841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8913", "reference_id": "RHSA-2022:8913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8917", "reference_id": "RHSA-2022:8917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5931", "reference_id": "RHSA-2023:5931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5979", "reference_id": "RHSA-2023:5979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5980", "reference_id": "RHSA-2023:5980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5982", "reference_id": "RHSA-2023:5982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6818", "reference_id": "RHSA-2023:6818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6818" }, { "reference_url": "https://usn.ubuntu.com/5488-1/", "reference_id": "USN-5488-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5488-1/" }, { "reference_url": "https://usn.ubuntu.com/5488-2/", "reference_id": "USN-5488-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5488-2/" }, { "reference_url": "https://usn.ubuntu.com/6457-1/", "reference_id": "USN-6457-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6457-1/" }, { "reference_url": "https://usn.ubuntu.com/7018-1/", "reference_id": "USN-7018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7018-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/", "reference_id": "VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2022-2068" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-95ub-7a6n-afdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16847?format=api", "vulnerability_id": "VCID-9gqm-1tcm-2kga", "summary": "Improper Certificate Validation\nA security vulnerability has been identified in all supported versions of OpenSSL related to the verification of X.509 certificate chains that include policy constraints. Attackers may be able to exploit this vulnerability by creating a malicious certificate chain that triggers exponential use of computational resources, leading to a denial-of-service (DoS) attack on affected systems. Policy processing is disabled by default but can be enabled by passing the `-policy' argument to the command line utilities or by calling the `X509_VERIFY_PARAM_set1_policies()' function.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0464.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0464.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0464", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74974", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74949", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74983", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00857", "scoring_system": "epss", "scoring_elements": "0.74945", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76623", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76593", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00968", "scoring_system": "epss", "scoring_elements": "0.76602", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76931", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:32Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2017771e2db3e2b96f89bbe8766c3209f6a99545" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:32Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2dcd4f1e3115f38cefa43e3efbe9b801c27e642e" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:32Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=879f7080d7e141f415c79eaa3a8ac4a3dad0348b" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:32Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=959c59c7a0164117e7f8366466a32bb1f8d77ff1" }, { "reference_url": "https://www.openssl.org/news/secadv/20230322.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:32Z/" } ], "url": "https://www.openssl.org/news/secadv/20230322.txt" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034720", "reference_id": "1034720", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034720" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181082", "reference_id": "2181082", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2181082" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0464", "reference_id": "CVE-2023-0464", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0464" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:32Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3722", "reference_id": "RHSA-2023:3722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7622", "reference_id": "RHSA-2023:7622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7623", "reference_id": "RHSA-2023:7623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625", "reference_id": "RHSA-2023:7625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626", "reference_id": "RHSA-2023:7626", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7626" }, { "reference_url": "https://usn.ubuntu.com/6039-1/", "reference_id": "USN-6039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6039-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2023-0464" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9gqm-1tcm-2kga" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16385?format=api", "vulnerability_id": "VCID-aens-jq7w-f7bh", "summary": "Double Free\nThe function PEM_read_bio_ex() reads a PEM file from a BIO and parses and decodes the \"name\" (e.g. \"CERTIFICATE\"), any header data and the payload data. If the function succeeds then the \"name_out\", \"header\" and \"data\" arguments are populated with pointers to buffers containing the relevant decoded data. The caller is responsible for freeing those buffers. It is possible to construct a PEM file that results in 0 bytes of payload data. In this case PEM_read_bio_ex() will return a failure code but will populate the header argument with a pointer to a buffer that has already been freed. If the caller also frees this buffer then a double free will occur. This will most likely lead to a crash. This could be exploited by an attacker who has the ability to supply malicious PEM files for parsing to achieve a denial of service attack. The functions PEM_read_bio() and PEM_read() are simple wrappers around PEM_read_bio_ex() and therefore these functions are also directly affected. These functions are also called indirectly by a number of other OpenSSL functions including PEM_X509_INFO_read_bio_ex() and SSL_CTX_use_serverinfo_file() which are also vulnerable. Some OpenSSL internal uses of these functions are not vulnerable because the caller does not free the header argument if PEM_read_bio_ex() returns a failure code. These locations include the PEM_read_bio_TYPE() functions as well as the decoders introduced in OpenSSL 3.0. The OpenSSL asn1parse command line application is also impacted by this issue.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4450.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4450.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4450", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35178", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35255", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35164", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35234", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35237", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.35202", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:38Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=63bcf189be73a9cc1264059bed6f57974be74a83" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:38Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=bbcf509bd046b34cca19c766bbddc31683d0858b" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2023-0010.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2023-0010.html" }, { "reference_url": "https://security.gentoo.org/glsa/202402-08", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:38Z/" } ], "url": "https://security.gentoo.org/glsa/202402-08" }, { "reference_url": "https://www.openssl.org/news/secadv/20230207.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:38Z/" } ], "url": "https://www.openssl.org/news/secadv/20230207.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164494", "reference_id": "2164494", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164494" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4450", "reference_id": "CVE-2022-4450", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4450" }, { "reference_url": "https://github.com/advisories/GHSA-v5w6-wcm8-jm4q", "reference_id": "GHSA-v5w6-wcm8-jm4q", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-v5w6-wcm8-jm4q" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0946", "reference_id": "RHSA-2023:0946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1199", "reference_id": "RHSA-2023:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1405", "reference_id": "RHSA-2023:1405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1405" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2165", "reference_id": "RHSA-2023:2165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2932", "reference_id": "RHSA-2023:2932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354", "reference_id": "RHSA-2023:3354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355", "reference_id": "RHSA-2023:3355", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3355" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3408", "reference_id": "RHSA-2023:3408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3420", "reference_id": "RHSA-2023:3420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3421", "reference_id": "RHSA-2023:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3421" }, { "reference_url": "https://usn.ubuntu.com/5844-1/", "reference_id": "USN-5844-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5844-1/" }, { "reference_url": "https://usn.ubuntu.com/6564-1/", "reference_id": "USN-6564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6564-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2022-4450", "GHSA-v5w6-wcm8-jm4q" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aens-jq7w-f7bh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64857?format=api", "vulnerability_id": "VCID-antn-nu5a-7yf6", "summary": "openssl: OpenSSL: Denial of Service via malformed TimeStamp Response", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69420.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69420.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-69420", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52364", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0029", "scoring_system": "epss", "scoring_elements": "0.52336", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53576", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53515", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53565", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53561", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53611", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00303", "scoring_system": "epss", "scoring_elements": "0.53594", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-69420" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://openssl-library.org/news/secadv/20260127.txt", "reference_id": "20260127.txt", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T19:33:06Z/" } ], "url": "https://openssl-library.org/news/secadv/20260127.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430388", "reference_id": "2430388", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430388" }, { "reference_url": "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9", "reference_id": "27c7012c91cc986a598d7540f3079dfde2416eb9", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T19:33:06Z/" } ], "url": "https://github.com/openssl/openssl/commit/27c7012c91cc986a598d7540f3079dfde2416eb9" }, { "reference_url": "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a", "reference_id": "4e254b48ad93cc092be3dd62d97015f33f73133a", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T19:33:06Z/" } ], "url": "https://github.com/openssl/openssl/commit/4e254b48ad93cc092be3dd62d97015f33f73133a" }, { "reference_url": "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e", "reference_id": "564fd9c73787f25693bf9e75faf7bf6bb1305d4e", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T19:33:06Z/" } ], "url": "https://github.com/openssl/openssl/commit/564fd9c73787f25693bf9e75faf7bf6bb1305d4e" }, { "reference_url": "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b", "reference_id": "5eb0770ffcf11b785cf374ff3c19196245e54f1b", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T19:33:06Z/" } ], "url": "https://github.com/openssl/openssl/commit/5eb0770ffcf11b785cf374ff3c19196245e54f1b" }, { "reference_url": "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085", "reference_id": "a99349ebfc519999edc50620abe24d599b9eb085", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T19:33:06Z/" } ], "url": "https://github.com/openssl/openssl/commit/a99349ebfc519999edc50620abe24d599b9eb085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1472", "reference_id": "RHSA-2026:1472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1473", "reference_id": "RHSA-2026:1473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1736", "reference_id": "RHSA-2026:1736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485", "reference_id": "RHSA-2026:2485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563", "reference_id": "RHSA-2026:2563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3228", "reference_id": "RHSA-2026:3228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943", "reference_id": "RHSA-2026:4943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4943" }, { "reference_url": "https://usn.ubuntu.com/7980-1/", "reference_id": "USN-7980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-1/" }, { "reference_url": "https://usn.ubuntu.com/7980-2/", "reference_id": "USN-7980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2025-69420" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-antn-nu5a-7yf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75049?format=api", "vulnerability_id": "VCID-bfv6-sbnh-5uh5", "summary": "openssl: SSL_select_next_proto buffer overread", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-5535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0505", "scoring_system": "epss", "scoring_elements": "0.89749", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0505", "scoring_system": "epss", "scoring_elements": "0.89767", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05181", "scoring_system": "epss", "scoring_elements": "0.89911", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05181", "scoring_system": "epss", "scoring_elements": "0.89872", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05181", "scoring_system": "epss", "scoring_elements": "0.89885", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05181", "scoring_system": "epss", "scoring_elements": "0.89912", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05181", "scoring_system": "epss", "scoring_elements": "0.8992", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05181", "scoring_system": "epss", "scoring_elements": "0.89918", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5535" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074487", "reference_id": "1074487", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074487" }, { "reference_url": "https://www.openssl.org/news/secadv/20240627.txt", "reference_id": "20240627.txt", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:50:16Z/" } ], "url": "https://www.openssl.org/news/secadv/20240627.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581", "reference_id": "2294581", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2294581" }, { "reference_url": "https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37", "reference_id": "4ada436a1946cbb24db5ab4ca082b69c1bc10f37", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:50:16Z/" } ], "url": "https://github.com/openssl/openssl/commit/4ada436a1946cbb24db5ab4ca082b69c1bc10f37" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c", "reference_id": "9947251413065a05189a63c9b7a6c1d4e224c21c", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:50:16Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/9947251413065a05189a63c9b7a6c1d4e224c21c" }, { "reference_url": "https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e", "reference_id": "99fb785a5f85315b95288921a321a935ea29a51e", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:50:16Z/" } ], "url": "https://github.com/openssl/openssl/commit/99fb785a5f85315b95288921a321a935ea29a51e" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87", "reference_id": "b78ec0824da857223486660177d3b1f255c65d87", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:50:16Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/b78ec0824da857223486660177d3b1f255c65d87" }, { "reference_url": "https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c", "reference_id": "cf6f91f6121f4db167405db2f0de410a456f260c", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:50:16Z/" } ], "url": "https://github.com/openssl/openssl/commit/cf6f91f6121f4db167405db2f0de410a456f260c" }, { "reference_url": "https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c", "reference_id": "e86ac436f0bd54d4517745483e2315650fae7b2c", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-06-27T13:50:16Z/" } ], "url": "https://github.com/openssl/openssl/commit/e86ac436f0bd54d4517745483e2315650fae7b2c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7846", "reference_id": "RHSA-2024:7846", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7846" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7847", "reference_id": "RHSA-2024:7847", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7847" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:7848", "reference_id": "RHSA-2024:7848", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:7848" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9333", "reference_id": "RHSA-2024:9333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1671", "reference_id": "RHSA-2025:1671", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1671" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1673", "reference_id": "RHSA-2025:1673", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1673" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3452", "reference_id": "RHSA-2025:3452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3453", "reference_id": "RHSA-2025:3453", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3453" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3666", "reference_id": "RHSA-2025:3666", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3666" }, { "reference_url": "https://usn.ubuntu.com/6937-1/", "reference_id": "USN-6937-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6937-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2024-5535" ], "risk_score": 4.1, "exploitability": "0.5", "weighted_severity": "8.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bfv6-sbnh-5uh5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82108?format=api", "vulnerability_id": "VCID-bnvh-m5tp-4qcd", "summary": "openssl: information disclosure in fork()", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1549.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87628", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87683", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87679", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87691", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87685", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87638", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87651", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03546", "scoring_system": "epss", "scoring_elements": "0.87673", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1549" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1549" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1b0fe00e2704b5e20334a16d3c9099d1ba2ef1be" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Oct/1" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190919-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190919-0002/" }, { "reference_url": "https://support.f5.com/csp/article/K44070243", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K44070243" }, { "reference_url": "https://support.f5.com/csp/article/K44070243?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K44070243?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4539" }, { "reference_url": "https://www.openssl.org/news/secadv/20190910.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20190910.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752095", "reference_id": "1752095", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752095" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1549", "reference_id": "CVE-2019-1549", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1549" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1336", "reference_id": "RHSA-2020:1336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1337", "reference_id": "RHSA-2020:1337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1840", "reference_id": "RHSA-2020:1840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1840" }, { "reference_url": "https://usn.ubuntu.com/4376-1/", "reference_id": "USN-4376-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4376-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2019-1549" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bnvh-m5tp-4qcd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64855?format=api", "vulnerability_id": "VCID-chgr-9utt-kqbp", "summary": "openssl: OpenSSL: Arbitrary code execution due to out-of-bounds write in PKCS#12 processing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69419.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69419.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-69419", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.19079", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.19027", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19551", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19521", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19602", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19654", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19659", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1961", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-69419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://openssl-library.org/news/secadv/20260127.txt", "reference_id": "20260127.txt", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/" } ], "url": "https://openssl-library.org/news/secadv/20260127.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386", "reference_id": "2430386", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430386" }, { "reference_url": "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296", "reference_id": "41be0f216404f14457bbf3b9cc488dba60b49296", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/" } ], "url": "https://github.com/openssl/openssl/commit/41be0f216404f14457bbf3b9cc488dba60b49296" }, { "reference_url": "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb", "reference_id": "7e9cac9832e4705b91987c2474ed06a37a93cecb", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/" } ], "url": "https://github.com/openssl/openssl/commit/7e9cac9832e4705b91987c2474ed06a37a93cecb" }, { "reference_url": "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2", "reference_id": "a26a90d38edec3748566129d824e664b54bee2e2", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/" } ], "url": "https://github.com/openssl/openssl/commit/a26a90d38edec3748566129d824e664b54bee2e2" }, { "reference_url": "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015", "reference_id": "cda12de3bc0e333ea8d2c6fd15001dbdaf280015", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/" } ], "url": "https://github.com/openssl/openssl/commit/cda12de3bc0e333ea8d2c6fd15001dbdaf280015" }, { "reference_url": "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535", "reference_id": "ff628933755075446bca8307e8417c14d164b535", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-29T15:09:04Z/" } ], "url": "https://github.com/openssl/openssl/commit/ff628933755075446bca8307e8417c14d164b535" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1472", "reference_id": "RHSA-2026:1472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1473", "reference_id": "RHSA-2026:1473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1496", "reference_id": "RHSA-2026:1496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1503", "reference_id": "RHSA-2026:1503", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1503" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1519", "reference_id": "RHSA-2026:1519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1594", "reference_id": "RHSA-2026:1594", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1594" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1733", "reference_id": "RHSA-2026:1733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1736", "reference_id": "RHSA-2026:1736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485", "reference_id": "RHSA-2026:2485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563", "reference_id": "RHSA-2026:2563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2994", "reference_id": "RHSA-2026:2994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2995", "reference_id": "RHSA-2026:2995", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2995" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3042", "reference_id": "RHSA-2026:3042", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3042" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3228", "reference_id": "RHSA-2026:3228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3364", "reference_id": "RHSA-2026:3364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3437", "reference_id": "RHSA-2026:3437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3861", "reference_id": "RHSA-2026:3861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4163", "reference_id": "RHSA-2026:4163", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4163" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4214", "reference_id": "RHSA-2026:4214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4472", "reference_id": "RHSA-2026:4472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4824", "reference_id": "RHSA-2026:4824", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4824" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4825", "reference_id": "RHSA-2026:4825", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943", "reference_id": "RHSA-2026:4943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4943" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5214", "reference_id": "RHSA-2026:5214", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5214" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5217", "reference_id": "RHSA-2026:5217", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5217" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:5873", "reference_id": "RHSA-2026:5873", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:5873" }, { "reference_url": "https://usn.ubuntu.com/7980-1/", "reference_id": "USN-7980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-1/" }, { "reference_url": "https://usn.ubuntu.com/7980-2/", "reference_id": "USN-7980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2025-69419" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-chgr-9utt-kqbp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16382?format=api", "vulnerability_id": "VCID-d83w-756y-3bfv", "summary": "Use After Free\nThe public API function BIO_new_NDEF is a helper function used for streaming ASN.1 data via a BIO. It is primarily used internally to OpenSSL to support the SMIME, CMS and PKCS7 streaming capabilities, but may also be called directly by end user applications. The function receives a BIO from the caller, prepends a new BIO_f_asn1 filter BIO onto the front of it to form a BIO chain, and then returns the new head of the BIO chain to the caller. Under certain conditions, for example if a CMS recipient public key is invalid, the new filter BIO is freed and the function returns a NULL result indicating a failure. However, in this case, the BIO chain is not properly cleaned up and the BIO passed by the caller still retains internal pointers to the previously freed filter BIO. If the caller then goes on to call BIO_pop() on the BIO then a use-after-free will occur. This will most likely result in a crash. This scenario occurs directly in the internal function B64_write_ASN1() which may cause BIO_new_NDEF() to be called and will subsequently call BIO_pop() on the BIO. This internal function is in turn called by the public API functions PEM_write_bio_ASN1_stream, PEM_write_bio_CMS_stream, PEM_write_bio_PKCS7_stream, SMIME_write_ASN1, SMIME_write_CMS and SMIME_write_PKCS7. Other public API functions that may be impacted by this include i2d_ASN1_bio_stream, BIO_new_CMS, BIO_new_PKCS7, i2d_CMS_bio_stream and i2d_PKCS7_bio_stream. The OpenSSL cms and smime command line applications are similarly affected.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0215.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0215.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0215", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66108", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66138", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66151", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66131", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66119", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66103", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00503", "scoring_system": "epss", "scoring_elements": "0.66071", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8818064ce3c3c0f1b740a5aaba2a987e75bfbafd" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9816136fe31d92ace4037d5da5257f763aeeb4eb" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=c3829dd8825c654652201e16f8a0a0c46ee3f344" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2023-0009.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2023-0009.html" }, { "reference_url": "https://security.gentoo.org/glsa/202402-08", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/" } ], "url": "https://security.gentoo.org/glsa/202402-08" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230427-0007", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20230427-0007" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230427-0009", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20230427-0009" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "reference_url": "https://www.openssl.org/news/secadv/20230207.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/" } ], "url": "https://www.openssl.org/news/secadv/20230207.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164492", "reference_id": "2164492", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164492" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0215", "reference_id": "CVE-2023-0215", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0215" }, { "reference_url": "https://github.com/advisories/GHSA-r7jw-wp68-3xch", "reference_id": "GHSA-r7jw-wp68-3xch", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-r7jw-wp68-3xch" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230427-0007/", "reference_id": "ntap-20230427-0007", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230427-0007/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230427-0009/", "reference_id": "ntap-20230427-0009", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230427-0009/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0946", "reference_id": "RHSA-2023:0946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1199", "reference_id": "RHSA-2023:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1405", "reference_id": "RHSA-2023:1405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1405" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2165", "reference_id": "RHSA-2023:2165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2932", "reference_id": "RHSA-2023:2932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354", "reference_id": "RHSA-2023:3354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355", "reference_id": "RHSA-2023:3355", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3355" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3408", "reference_id": "RHSA-2023:3408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3420", "reference_id": "RHSA-2023:3420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3421", "reference_id": "RHSA-2023:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4128", "reference_id": "RHSA-2023:4128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4128" }, { "reference_url": "https://usn.ubuntu.com/5844-1/", "reference_id": "USN-5844-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5844-1/" }, { "reference_url": "https://usn.ubuntu.com/5845-1/", "reference_id": "USN-5845-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5845-1/" }, { "reference_url": "https://usn.ubuntu.com/5845-2/", "reference_id": "USN-5845-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5845-2/" }, { "reference_url": "https://usn.ubuntu.com/6564-1/", "reference_id": "USN-6564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6564-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2023-0215", "GHSA-r7jw-wp68-3xch" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-d83w-756y-3bfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/76931?format=api", "vulnerability_id": "VCID-efpm-7cfa-z7hx", "summary": "openssl: Unbounded memory growth with session handling in TLSv1.3", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2511.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-2511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03021", "scoring_system": "epss", "scoring_elements": "0.86616", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03021", "scoring_system": "epss", "scoring_elements": "0.86612", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03021", "scoring_system": "epss", "scoring_elements": "0.86626", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03021", "scoring_system": "epss", "scoring_elements": "0.86623", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03875", "scoring_system": "epss", "scoring_elements": "0.88227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03875", "scoring_system": "epss", "scoring_elements": "0.88207", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03875", "scoring_system": "epss", "scoring_elements": "0.88201", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03875", "scoring_system": "epss", "scoring_elements": "0.88186", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2511" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068658", "reference_id": "1068658", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1068658" }, { "reference_url": "https://www.openssl.org/news/secadv/20240408.txt", "reference_id": "20240408.txt", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-09T15:14:41Z/" } ], "url": "https://www.openssl.org/news/secadv/20240408.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274020", "reference_id": "2274020", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274020" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640", "reference_id": "5f8d25770ae6437db119dfc951e207271a326640", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-09T15:14:41Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640" }, { "reference_url": "https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce", "reference_id": "7e4d731b1c07201ad9374c1cd9ac5263bdf35bce", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-09T15:14:41Z/" } ], "url": "https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce" }, { "reference_url": "https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d", "reference_id": "b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-09T15:14:41Z/" } ], "url": "https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d" }, { "reference_url": "https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08", "reference_id": "e9d7083e241670332e0443da0f0d4ffb52829f08", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-09T15:14:41Z/" } ], "url": "https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9333", "reference_id": "RHSA-2024:9333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9333" }, { "reference_url": "https://usn.ubuntu.com/6937-1/", "reference_id": "USN-6937-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6937-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2024-2511" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-efpm-7cfa-z7hx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38786?format=api", "vulnerability_id": "VCID-eqss-dzdc-tkbj", "summary": "Multiple vulnerabilities were found in OpenSSL, the worst of which\n could allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03874", "scoring_system": "epss", "scoring_elements": "0.88176", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03874", "scoring_system": "epss", "scoring_elements": "0.88184", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03874", "scoring_system": "epss", "scoring_elements": "0.882", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03874", "scoring_system": "epss", "scoring_elements": "0.88206", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03874", "scoring_system": "epss", "scoring_elements": "0.88226", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03874", "scoring_system": "epss", "scoring_elements": "0.88232", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03874", "scoring_system": "epss", "scoring_elements": "0.88243", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03874", "scoring_system": "epss", "scoring_elements": "0.88236", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780995", "reference_id": "1780995", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1780995" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947949", "reference_id": "947949", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=947949" }, { "reference_url": "https://security.gentoo.org/glsa/202004-10", "reference_id": "GLSA-202004-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202004-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4383", "reference_id": "RHSA-2020:4383", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4383" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4384", "reference_id": "RHSA-2020:4384", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4384" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:4514", "reference_id": "RHSA-2020:4514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:4514" }, { "reference_url": "https://usn.ubuntu.com/4376-1/", "reference_id": "USN-4376-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4376-1/" }, { "reference_url": "https://usn.ubuntu.com/4504-1/", "reference_id": "USN-4504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2019-1551" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eqss-dzdc-tkbj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50398?format=api", "vulnerability_id": "VCID-frd6-gt2a-afhv", "summary": "Multiple vulnerabilities have been discovered in OpenSSL, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2097.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2097.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2097", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54836", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54847", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5487", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54888", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54876", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54879", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.54829", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00318", "scoring_system": "epss", "scoring_elements": "0.5486", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-2097" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/alexcrichton/openssl-src-rs", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/alexcrichton/openssl-src-rs" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=919925673d6c9cfed3c1085497f5dfbbed5fc431" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a98f339ddd7e8f487d6e0088d4a9a42324885a93" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a98f339ddd7e8f487d6e0088d4a9a42324885a93" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/02/msg00019.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2097", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2097" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2022-0032.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2022-0032.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220715-0011", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220715-0011" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230420-0008", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20230420-0008" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "reference_url": "https://www.debian.org/security/2023/dsa-5343", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://www.debian.org/security/2023/dsa-5343" }, { "reference_url": "https://www.openssl.org/news/secadv/20220705.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://www.openssl.org/news/secadv/20220705.txt" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023424", "reference_id": "1023424", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1023424" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104905", "reference_id": "2104905", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104905" }, { "reference_url": "https://github.com/advisories/GHSA-3wx7-46ch-7rq2", "reference_id": "GHSA-3wx7-46ch-7rq2", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-3wx7-46ch-7rq2" }, { "reference_url": "https://security.gentoo.org/glsa/202210-02", "reference_id": "GLSA-202210-02", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220715-0011/", "reference_id": "ntap-20220715-0011", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20220715-0011/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230420-0008/", "reference_id": "ntap-20230420-0008", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230420-0008/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/", "reference_id": "R6CK57NBQFTPUMXAPJURCGXUYT76NQAK", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R6CK57NBQFTPUMXAPJURCGXUYT76NQAK/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5818", "reference_id": "RHSA-2022:5818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6224", "reference_id": "RHSA-2022:6224", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6224" }, { "reference_url": "https://usn.ubuntu.com/5502-1/", "reference_id": "USN-5502-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5502-1/" }, { "reference_url": "https://usn.ubuntu.com/6457-1/", "reference_id": "USN-6457-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6457-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/", "reference_id": "V6567JERRHHJW2GNGJGKDRNHR7SNPZK7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V6567JERRHHJW2GNGJGKDRNHR7SNPZK7/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/", "reference_id": "VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-07-26T19:45:07Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VCMNWKERPBKOEBNL7CLTTX3ZZCZLH7XA/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2022-2097", "GHSA-3wx7-46ch-7rq2" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-frd6-gt2a-afhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67393?format=api", "vulnerability_id": "VCID-fwwa-41df-zqfk", "summary": "openssl: Out-of-bounds read & write in RFC 3211 KEK Unwrap", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9230.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9230.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9230", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10091", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10165", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10153", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10049", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10125", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10186", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10225", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10185", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-9230" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://openssl-library.org/news/secadv/20250930.txt", "reference_id": "20250930.txt", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-30T19:30:08Z/" } ], "url": "https://openssl-library.org/news/secadv/20250930.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396054", "reference_id": "2396054", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2396054" }, { "reference_url": "https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45", "reference_id": "5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-30T19:30:08Z/" } ], "url": "https://github.com/openssl/openssl/commit/5965ea5dd6960f36d8b7f74f8eac67a8eb8f2b45" }, { "reference_url": "https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280", "reference_id": "9e91358f365dee6c446dcdcdb01c04d2743fd280", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-30T19:30:08Z/" } ], "url": "https://github.com/openssl/openssl/commit/9e91358f365dee6c446dcdcdb01c04d2743fd280" }, { "reference_url": "https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def", "reference_id": "a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-30T19:30:08Z/" } ], "url": "https://github.com/openssl/openssl/commit/a79c4ce559c6a3a8fd4109e9f33c1185d5bf2def" }, { "reference_url": "https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd", "reference_id": "b5282d677551afda7d20e9c00e09561b547b2dfd", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-30T19:30:08Z/" } ], "url": "https://github.com/openssl/openssl/commit/b5282d677551afda7d20e9c00e09561b547b2dfd" }, { "reference_url": "https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482", "reference_id": "bae259a211ada6315dc50900686daaaaaa55f482", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-30T19:30:08Z/" } ], "url": "https://github.com/openssl/openssl/commit/bae259a211ada6315dc50900686daaaaaa55f482" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3", "reference_id": "c2b96348bfa662f25f4fabf81958ae822063dae3", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-30T19:30:08Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/c2b96348bfa662f25f4fabf81958ae822063dae3" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba", "reference_id": "dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-30T19:30:08Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/dfbaf161d8dafc1132dd88cd48ad990ed9b4c8ba" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21174", "reference_id": "RHSA-2025:21174", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21174" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21248", "reference_id": "RHSA-2025:21248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21255", "reference_id": "RHSA-2025:21255", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21255" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21562", "reference_id": "RHSA-2025:21562", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21562" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:21994", "reference_id": "RHSA-2025:21994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:21994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22428", "reference_id": "RHSA-2025:22428", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22428" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22529", "reference_id": "RHSA-2025:22529", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22529" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22548", "reference_id": "RHSA-2025:22548", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22548" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22794", "reference_id": "RHSA-2025:22794", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22794" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22868", "reference_id": "RHSA-2025:22868", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22868" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23078", "reference_id": "RHSA-2025:23078", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23078" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23079", "reference_id": "RHSA-2025:23079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23080", "reference_id": "RHSA-2025:23080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23202", "reference_id": "RHSA-2025:23202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23204", "reference_id": "RHSA-2025:23204", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23204" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23205", "reference_id": "RHSA-2025:23205", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23205" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23209", "reference_id": "RHSA-2025:23209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23449", "reference_id": "RHSA-2025:23449", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23449" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0332", "reference_id": "RHSA-2026:0332", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0337", "reference_id": "RHSA-2026:0337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0420", "reference_id": "RHSA-2026:0420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0602", "reference_id": "RHSA-2026:0602", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0602" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0674", "reference_id": "RHSA-2026:0674", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0674" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0702", "reference_id": "RHSA-2026:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0714", "reference_id": "RHSA-2026:0714", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0714" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0794", "reference_id": "RHSA-2026:0794", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0794" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:0887", "reference_id": "RHSA-2026:0887", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:0887" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1349", "reference_id": "RHSA-2026:1349", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1349" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1475", "reference_id": "RHSA-2026:1475", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1475" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1652", "reference_id": "RHSA-2026:1652", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1652" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1720", "reference_id": "RHSA-2026:1720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2771", "reference_id": "RHSA-2026:2771", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2771" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2776", "reference_id": "RHSA-2026:2776", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2776" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2974", "reference_id": "RHSA-2026:2974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2994", "reference_id": "RHSA-2026:2994", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2994" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2995", "reference_id": "RHSA-2026:2995", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2995" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3164", "reference_id": "RHSA-2026:3164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3415", "reference_id": "RHSA-2026:3415", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3415" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3461", "reference_id": "RHSA-2026:3461", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3461" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3462", "reference_id": "RHSA-2026:3462", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3462" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3861", "reference_id": "RHSA-2026:3861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3861" }, { "reference_url": "https://usn.ubuntu.com/7786-1/", "reference_id": "USN-7786-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7786-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2025-9230" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fwwa-41df-zqfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16371?format=api", "vulnerability_id": "VCID-gnpm-mnpa-3kdg", "summary": "Timing based side channel\nA timing based side channel exists in the OpenSSL RSA Decryption implementation which could be sufficient to recover a plaintext across a network in a Bleichenbacher style attack. To achieve a successful decryption an attacker would have to be able to send a very large number of trial messages for decryption. The vulnerability affects all RSA padding modes: PKCS#1 v1.5, RSA-OEAP and RSASVE. For example, in a TLS connection, RSA is commonly used by a client to send an encrypted pre-master secret to the server. An attacker that had observed a genuine connection between a client and a server could use this flaw to send trial messages to the server and record the time taken to process them. After a sufficiently large number of messages the attacker could recover the pre-master secret used for the original connection and thus be able to decrypt the application data sent over that connection.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4304.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-4304.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4304", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48911", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48903", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48912", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48915", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48861", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48907", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48881", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-4304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2023-0007.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2023-0007.html" }, { "reference_url": "https://security.gentoo.org/glsa/202402-08", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:19Z/" } ], "url": "https://security.gentoo.org/glsa/202402-08" }, { "reference_url": "https://www.openssl.org/news/secadv/20230207.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:19Z/" } ], "url": "https://www.openssl.org/news/secadv/20230207.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164487", "reference_id": "2164487", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164487" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4304", "reference_id": "CVE-2022-4304", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4304" }, { "reference_url": "https://github.com/advisories/GHSA-p52g-cm5j-mjv4", "reference_id": "GHSA-p52g-cm5j-mjv4", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-p52g-cm5j-mjv4" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0946", "reference_id": "RHSA-2023:0946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1199", "reference_id": "RHSA-2023:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1405", "reference_id": "RHSA-2023:1405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1405" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2165", "reference_id": "RHSA-2023:2165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2932", "reference_id": "RHSA-2023:2932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354", "reference_id": "RHSA-2023:3354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355", "reference_id": "RHSA-2023:3355", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3355" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3408", "reference_id": "RHSA-2023:3408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3420", "reference_id": "RHSA-2023:3420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3421", "reference_id": "RHSA-2023:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4128", "reference_id": "RHSA-2023:4128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4128" }, { "reference_url": "https://usn.ubuntu.com/5844-1/", "reference_id": "USN-5844-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5844-1/" }, { "reference_url": "https://usn.ubuntu.com/6564-1/", "reference_id": "USN-6564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6564-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2022-4304", "GHSA-p52g-cm5j-mjv4" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gnpm-mnpa-3kdg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/13325?format=api", "vulnerability_id": "VCID-gsbn-6t86-7kf9", "summary": "Loop with Unreachable Exit Condition ('Infinite Loop')\nThe BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters", "references": [ { "reference_url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0778.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0778", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06432", "scoring_system": "epss", "scoring_elements": "0.91023", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07109", "scoring_system": "epss", "scoring_elements": "0.91513", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07109", "scoring_system": "epss", "scoring_elements": "0.91526", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07109", "scoring_system": "epss", "scoring_elements": "0.91532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07394", "scoring_system": "epss", "scoring_elements": "0.91693", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07394", "scoring_system": "epss", "scoring_elements": "0.91701", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07807", "scoring_system": "epss", "scoring_elements": "0.91978", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08117", "scoring_system": "epss", "scoring_elements": "0.92165", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.08117", "scoring_system": "epss", "scoring_elements": "0.92166", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0778" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/May/33", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://seclists.org/fulldisclosure/2022/May/33" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/May/35", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://seclists.org/fulldisclosure/2022/May/35" }, { "reference_url": "http://seclists.org/fulldisclosure/2022/May/38", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://seclists.org/fulldisclosure/2022/May/38" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=380085481c64de749a6dd25cdf0bcf4360b30f83" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=a466912611aa6cbdf550cd10601390e587451246" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00023.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00024.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/323SNN6ZX7PRJJWP2BUAFLPUAE42XWLZ" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GDB3GQVJPXJE7X5C5JN6JAA4XUDWD6E6" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W6K3PR542DXWLEFFMFIDMME4CWMHJRMG" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2022-0014.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2022-0014.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220321-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220321-0002" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220321-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20220321-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20220429-0005", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20220429-0005" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "reference_url": "https://support.apple.com/kb/HT213255", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://support.apple.com/kb/HT213255" }, { "reference_url": "https://support.apple.com/kb/HT213256", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://support.apple.com/kb/HT213256" }, { "reference_url": "https://support.apple.com/kb/HT213257", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://support.apple.com/kb/HT213257" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5103", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2022/dsa-5103" }, { "reference_url": "https://www.openssl.org/news/secadv/20220315.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.openssl.org/news/secadv/20220315.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "https://www.tenable.com/security/tns-2022-06", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2022-06" }, { "reference_url": "https://www.tenable.com/security/tns-2022-07", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2022-07" }, { "reference_url": "https://www.tenable.com/security/tns-2022-08", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2022-08" }, { "reference_url": "https://www.tenable.com/security/tns-2022-09", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2022-09" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202", "reference_id": "2062202", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2062202" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778", "reference_id": "CVE-2022-0778", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0778" }, { "reference_url": "https://github.com/advisories/GHSA-x3mh-jvjw-3xwx", "reference_id": "GHSA-x3mh-jvjw-3xwx", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-x3mh-jvjw-3xwx" }, { "reference_url": "https://security.gentoo.org/glsa/202210-02", "reference_id": "GLSA-202210-02", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "reference_url": "https://security.gentoo.org/glsa/202405-29", "reference_id": "GLSA-202405-29", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202405-29" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1065", "reference_id": "RHSA-2022:1065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1066", "reference_id": "RHSA-2022:1066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1071", "reference_id": "RHSA-2022:1071", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1071" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1073", "reference_id": "RHSA-2022:1073", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1073" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1076", "reference_id": "RHSA-2022:1076", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1076" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1077", "reference_id": "RHSA-2022:1077", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1077" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1078", "reference_id": "RHSA-2022:1078", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1078" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1082", "reference_id": "RHSA-2022:1082", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1082" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1091", "reference_id": "RHSA-2022:1091", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1091" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1112", "reference_id": "RHSA-2022:1112", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1112" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1263", "reference_id": "RHSA-2022:1263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1389", "reference_id": "RHSA-2022:1389", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1389" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1390", "reference_id": "RHSA-2022:1390", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1390" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1519", "reference_id": "RHSA-2022:1519", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1520", "reference_id": "RHSA-2022:1520", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1520" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4896", "reference_id": "RHSA-2022:4896", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4896" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:4899", "reference_id": "RHSA-2022:4899", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:4899" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5326", "reference_id": "RHSA-2022:5326", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5326" }, { "reference_url": "https://usn.ubuntu.com/5328-1/", "reference_id": "USN-5328-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5328-1/" }, { "reference_url": "https://usn.ubuntu.com/5328-2/", "reference_id": "USN-5328-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5328-2/" }, { "reference_url": "https://usn.ubuntu.com/6457-1/", "reference_id": "USN-6457-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6457-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2022-0778", "GHSA-x3mh-jvjw-3xwx" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gsbn-6t86-7kf9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73537?format=api", "vulnerability_id": "VCID-gz4c-x1gb-muat", "summary": "openssl: Low-level invalid GF(2^m) parameters lead to OOB memory access", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9143.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-9143.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00639", "scoring_system": "epss", "scoring_elements": "0.70512", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00639", "scoring_system": "epss", "scoring_elements": "0.70462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00639", "scoring_system": "epss", "scoring_elements": "0.70479", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00639", "scoring_system": "epss", "scoring_elements": "0.70457", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00639", "scoring_system": "epss", "scoring_elements": "0.70503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00639", "scoring_system": "epss", "scoring_elements": "0.70518", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00639", "scoring_system": "epss", "scoring_elements": "0.70542", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00639", "scoring_system": "epss", "scoring_elements": "0.70526", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-9143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9143" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085378", "reference_id": "1085378", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1085378" }, { "reference_url": "https://openssl-library.org/news/secadv/20241016.txt", "reference_id": "20241016.txt", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/" } ], "url": "https://openssl-library.org/news/secadv/20241016.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2319236", "reference_id": "2319236", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2319236" }, { "reference_url": "https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712", "reference_id": "72ae83ad214d2eef262461365a1975707f862712", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/" } ], "url": "https://github.com/openssl/openssl/commit/72ae83ad214d2eef262461365a1975707f862712" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a", "reference_id": "8efc0cbaa8ebba8e116f7b81a876a4123594d86a", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/8efc0cbaa8ebba8e116f7b81a876a4123594d86a" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41", "reference_id": "9d576994cec2b7aa37a91740ea7e680810957e41", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/9d576994cec2b7aa37a91740ea7e680810957e41" }, { "reference_url": "https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700", "reference_id": "bc7e04d7c8d509fb78fc0e285aa948fb0da04700", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/" } ], "url": "https://github.com/openssl/openssl/commit/bc7e04d7c8d509fb78fc0e285aa948fb0da04700" }, { "reference_url": "https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4", "reference_id": "c0d3e4d32d2805f49bec30547f225bc4d092e1f4", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/" } ], "url": "https://github.com/openssl/openssl/commit/c0d3e4d32d2805f49bec30547f225bc4d092e1f4" }, { "reference_url": "https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154", "reference_id": "fdf6723362ca51bd883295efe206cb5b1cfa5154", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:45:11Z/" } ], "url": "https://github.com/openssl/openssl/commit/fdf6723362ca51bd883295efe206cb5b1cfa5154" }, { "reference_url": "https://usn.ubuntu.com/7264-1/", "reference_id": "USN-7264-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7264-1/" }, { "reference_url": "https://usn.ubuntu.com/7278-1/", "reference_id": "USN-7278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7278-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2024-9143" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gz4c-x1gb-muat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16955?format=api", "vulnerability_id": "VCID-hjgb-ch1w-nbfs", "summary": "Improper Certificate Validation\nThe function X509_VERIFY_PARAM_add0_policy() is documented to implicitly enable the certificate policy check when doing certificate verification. However the implementation of the function does not enable the check which allows certificates with invalid or incorrect policies to pass the certificate verification. As suddenly enabling the policy check could break existing deployments it was decided to keep the existing behavior of the X509_VERIFY_PARAM_add0_policy() function. Instead the applications that require OpenSSL to perform certificate policy check need to use X509_VERIFY_PARAM_set1_policies() or explicitly enable the policy check by calling X509_VERIFY_PARAM_set_flags() with the X509_V_FLAG_POLICY_CHECK flag argument. Certificate policy checks are disabled by default in OpenSSL and are not commonly used by applications.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0466.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0466.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0466", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72206", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72242", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72226", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72201", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72238", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.7225", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00711", "scoring_system": "epss", "scoring_elements": "0.72256", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0464" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0465" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0466" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2650" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T17:11:17Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=0d16b7e99aafc0b4a6d729eec65a411a7e025f0a" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T17:11:17Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=51e8a84ce742db0f6c70510d0159dad8f7825908" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T17:11:17Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=73398dea26de9899fb4baa94098ad0a61f435c72" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T17:11:17Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc814a30fc4f0bc54fcea7d9a7462f5457aab061" }, { "reference_url": "https://www.openssl.org/news/secadv/20230328.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T17:11:17Z/" } ], "url": "https://www.openssl.org/news/secadv/20230328.txt" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034720", "reference_id": "1034720", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034720" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182565", "reference_id": "2182565", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2182565" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0466", "reference_id": "CVE-2023-0466", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0466" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html", "reference_id": "msg00011.html", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T17:11:17Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2023/06/msg00011.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20230414-0001/", "reference_id": "ntap-20230414-0001", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-19T17:11:17Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20230414-0001/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3722", "reference_id": "RHSA-2023:3722", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3722" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7622", "reference_id": "RHSA-2023:7622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7623", "reference_id": "RHSA-2023:7623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625", "reference_id": "RHSA-2023:7625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626", "reference_id": "RHSA-2023:7626", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7626" }, { "reference_url": "https://usn.ubuntu.com/6039-1/", "reference_id": "USN-6039-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6039-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2023-0466" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hjgb-ch1w-nbfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39448?format=api", "vulnerability_id": "VCID-hpd4-t99c-zffu", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which could allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3450.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3450.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3450", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66171", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66202", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66214", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66195", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66182", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66097", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66165", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66134", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3450" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/alexcrichton/openssl-src-rs", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/alexcrichton/openssl-src-rs" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "reference_url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3450" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0056.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0056.html" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210326-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210326-0006" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210326-0006/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "reference_url": "https://www.openssl.org/news/secadv/20210325.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "reference_url": "https://www.tenable.com/security/tns-2021-05", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-05" }, { "reference_url": "https://www.tenable.com/security/tns-2021-08", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-08" }, { "reference_url": "https://www.tenable.com/security/tns-2021-09", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-09" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/03/27/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/03/27/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/03/28/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/03/28/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547", "reference_id": "1941547", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941547" }, { "reference_url": "https://security.archlinux.org/ASA-202103-10", "reference_id": "ASA-202103-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202103-10" }, { "reference_url": "https://security.archlinux.org/AVG-1736", "reference_id": "AVG-1736", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1736" }, { "reference_url": "https://github.com/advisories/GHSA-8hfj-xrj2-pm22", "reference_id": "GHSA-8hfj-xrj2-pm22", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-8hfj-xrj2-pm22" }, { "reference_url": "https://security.gentoo.org/glsa/202103-03", "reference_id": "GLSA-202103-03", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202103-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1024", "reference_id": "RHSA-2021:1024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1189", "reference_id": "RHSA-2021:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1195", "reference_id": "RHSA-2021:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1196", "reference_id": "RHSA-2021:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1199", "reference_id": "RHSA-2021:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1200", "reference_id": "RHSA-2021:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1202", "reference_id": "RHSA-2021:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1203", "reference_id": "RHSA-2021:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1203" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2021-3450", "GHSA-8hfj-xrj2-pm22" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hpd4-t99c-zffu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/14009?format=api", "vulnerability_id": "VCID-hpev-apm4-sqfw", "summary": "Null pointer dereference in PKCS12 parsing\nIssue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL\nto crash leading to a potential Denial of Service attack\n\nImpact summary: Applications loading files in the PKCS12 format from untrusted\nsources might terminate abruptly.\n\nA file in PKCS12 format can contain certificates and keys and may come from an\nuntrusted source. The PKCS12 specification allows certain fields to be NULL, but\nOpenSSL does not correctly check for this case. This can lead to a NULL pointer\ndereference that results in OpenSSL crashing. If an application processes PKCS12\nfiles from an untrusted source using the OpenSSL APIs then that application will\nbe vulnerable to this issue.\n\nOpenSSL APIs that are vulnerable to this are: PKCS12_parse(),\nPKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()\nand PKCS12_newpass().\n\nWe have also fixed a similar issue in SMIME_write_PKCS7(). However since this\nfunction is related to writing data we do not consider it security significant.\n\nThe FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0727.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0727.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0727", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00236", "scoring_system": "epss", "scoring_elements": "0.46537", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00236", "scoring_system": "epss", "scoring_elements": "0.46533", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00236", "scoring_system": "epss", "scoring_elements": "0.46556", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00236", "scoring_system": "epss", "scoring_elements": "0.46509", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00236", "scoring_system": "epss", "scoring_elements": "0.46528", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00236", "scoring_system": "epss", "scoring_elements": "0.46529", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00236", "scoring_system": "epss", "scoring_elements": "0.46477", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-0727" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0727" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/alexcrichton/openssl-src-rs/commit/add20f73b6b42be7451af2e1044d4e0e778992b2", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/alexcrichton/openssl-src-rs/commit/add20f73b6b42be7451af2e1044d4e0e778992b2" }, { "reference_url": "https://github.com/github/advisory-database/pull/3472", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/github/advisory-database/pull/3472" }, { "reference_url": "https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:15:21Z/" } ], "url": "https://github.com/openssl/openssl/commit/09df4395b5071217b76dc7d3d2e630eb8c5a79c2" }, { "reference_url": "https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:15:21Z/" } ], "url": "https://github.com/openssl/openssl/commit/775acfdbd0c6af9ac855f34969cdab0c0c90844a" }, { "reference_url": "https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:15:21Z/" } ], "url": "https://github.com/openssl/openssl/commit/d135eeab8a5dbf72b3da5240bab9ddb7678dbd2c" }, { "reference_url": "https://github.com/openssl/openssl/pull/23362", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/openssl/openssl/pull/23362" }, { "reference_url": "https://github.com/pyca/cryptography/commit/3519591d255d4506fbcd0d04037d45271903c64d", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/pyca/cryptography/commit/3519591d255d4506fbcd0d04037d45271903c64d" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:15:21Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/03b3941d60c4bce58fab69a0c22377ab439bc0e8" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:15:21Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/aebaa5883e31122b404e450732dc833dc9dee539" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/10/msg00033.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00000.html" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0727", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0727" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240208-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240208-0006" }, { "reference_url": "https://www.openssl.org/news/secadv/20240125.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T20:15:21Z/" } ], "url": "https://www.openssl.org/news/secadv/20240125.txt" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2024/03/11/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2024/03/11/1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061582", "reference_id": "1061582", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061582" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259944", "reference_id": "2259944", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259944" }, { "reference_url": "https://github.com/advisories/GHSA-9v9h-cgj8-h64p", "reference_id": "GHSA-9v9h-cgj8-h64p", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-9v9h-cgj8-h64p" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2447", "reference_id": "RHSA-2024:2447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9088", "reference_id": "RHSA-2024:9088", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9088" }, { "reference_url": "https://usn.ubuntu.com/6622-1/", "reference_id": "USN-6622-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6622-1/" }, { "reference_url": "https://usn.ubuntu.com/6632-1/", "reference_id": "USN-6632-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6632-1/" }, { "reference_url": "https://usn.ubuntu.com/6709-1/", "reference_id": "USN-6709-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6709-1/" }, { "reference_url": "https://usn.ubuntu.com/7018-1/", "reference_id": "USN-7018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7018-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2024-0727", "GHSA-9v9h-cgj8-h64p" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hpev-apm4-sqfw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/75509?format=api", "vulnerability_id": "VCID-jq5s-hzam-zfda", "summary": "openssl: Use After Free with SSL_free_buffers", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4741.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.6", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4741.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4741", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00264", "scoring_system": "epss", "scoring_elements": "0.49905", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58119", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58094", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58152", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58167", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00359", "scoring_system": "epss", "scoring_elements": "0.58144", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4741" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4741", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4741" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072113", "reference_id": "1072113", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1072113" }, { "reference_url": "https://www.openssl.org/news/secadv/20240528.txt", "reference_id": "20240528.txt", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T14:45:07Z/" } ], "url": "https://www.openssl.org/news/secadv/20240528.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283757", "reference_id": "2283757", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283757" }, { "reference_url": "https://github.com/openssl/openssl/commit/704f725b96aa373ee45ecfb23f6abfe8be8d9177", "reference_id": "704f725b96aa373ee45ecfb23f6abfe8be8d9177", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T14:45:07Z/" } ], "url": "https://github.com/openssl/openssl/commit/704f725b96aa373ee45ecfb23f6abfe8be8d9177" }, { "reference_url": "https://github.com/openssl/openssl/commit/b3f0eb0a295f58f16ba43ba99dad70d4ee5c437d", "reference_id": "b3f0eb0a295f58f16ba43ba99dad70d4ee5c437d", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T14:45:07Z/" } ], "url": "https://github.com/openssl/openssl/commit/b3f0eb0a295f58f16ba43ba99dad70d4ee5c437d" }, { "reference_url": "https://github.com/openssl/openssl/commit/c88c3de51020c37e8706bf7a682a162593053aac", "reference_id": "c88c3de51020c37e8706bf7a682a162593053aac", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T14:45:07Z/" } ], "url": "https://github.com/openssl/openssl/commit/c88c3de51020c37e8706bf7a682a162593053aac" }, { "reference_url": "https://github.com/openssl/openssl/commit/e5093133c35ca82874ad83697af76f4b0f7e3bd8", "reference_id": "e5093133c35ca82874ad83697af76f4b0f7e3bd8", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T14:45:07Z/" } ], "url": "https://github.com/openssl/openssl/commit/e5093133c35ca82874ad83697af76f4b0f7e3bd8" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/f7a045f3143fc6da2ee66bf52d8df04829590dd4", "reference_id": "f7a045f3143fc6da2ee66bf52d8df04829590dd4", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-13T14:45:07Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/f7a045f3143fc6da2ee66bf52d8df04829590dd4" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9333", "reference_id": "RHSA-2024:9333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9333" }, { "reference_url": "https://usn.ubuntu.com/6937-1/", "reference_id": "USN-6937-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6937-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2024-4741" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jq5s-hzam-zfda" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72021?format=api", "vulnerability_id": "VCID-mg21-k76s-sqfp", "summary": "openssl: Timing side-channel in ECDSA signature computation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-13176.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-13176.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-13176", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22223", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22339", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22384", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22169", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22252", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22305", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22325", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00073", "scoring_system": "epss", "scoring_elements": "0.22283", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-13176" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13176", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13176" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844", "reference_id": "07272b05b04836a762b4baa874958af51d513844", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T20:21:21Z/" } ], "url": "https://github.com/openssl/openssl/commit/07272b05b04836a762b4baa874958af51d513844" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded", "reference_id": "0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T20:21:21Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/0d5fd1ab987f7571e2c955d8d8b638fc0fb54ded" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094027", "reference_id": "1094027", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1094027" }, { "reference_url": "https://openssl-library.org/news/secadv/20250120.txt", "reference_id": "20250120.txt", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T20:21:21Z/" } ], "url": "https://openssl-library.org/news/secadv/20250120.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2338999", "reference_id": "2338999", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2338999" }, { "reference_url": "https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467", "reference_id": "2af62e74fb59bc469506bc37eb2990ea408d9467", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T20:21:21Z/" } ], "url": "https://github.com/openssl/openssl/commit/2af62e74fb59bc469506bc37eb2990ea408d9467" }, { "reference_url": "https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902", "reference_id": "392dcb336405a0c94486aa6655057f59fd3a0902", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T20:21:21Z/" } ], "url": "https://github.com/openssl/openssl/commit/392dcb336405a0c94486aa6655057f59fd3a0902" }, { "reference_url": "https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65", "reference_id": "4b1cb94a734a7d4ec363ac0a215a25c181e11f65", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T20:21:21Z/" } ], "url": "https://github.com/openssl/openssl/commit/4b1cb94a734a7d4ec363ac0a215a25c181e11f65" }, { "reference_url": "https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f", "reference_id": "77c608f4c8857e63e98e66444e2e761c9627916f", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T20:21:21Z/" } ], "url": "https://github.com/openssl/openssl/commit/77c608f4c8857e63e98e66444e2e761c9627916f" }, { "reference_url": "https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86", "reference_id": "a2639000db19878d5d89586ae7b725080592ae86", "reference_type": "", "scores": [ { "value": "4.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-27T20:21:21Z/" } ], "url": "https://github.openssl.org/openssl/extended-releases/commit/a2639000db19878d5d89586ae7b725080592ae86" }, { "reference_url": "https://usn.ubuntu.com/7264-1/", "reference_id": "USN-7264-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7264-1/" }, { "reference_url": "https://usn.ubuntu.com/7278-1/", "reference_id": "USN-7278-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7278-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2024-13176" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mg21-k76s-sqfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/12414?format=api", "vulnerability_id": "VCID-myuq-u3as-g3ah", "summary": "Carry Propagation bug\nThere is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4160.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4160.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4160", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53163", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53247", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.5318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53233", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53227", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53278", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00299", "scoring_system": "epss", "scoring_elements": "0.53264", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-4160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4160" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3bf7b73ea7123045b8f972badc67ed6878e6c37f" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6fc1aaaf303185aa5e483e06bdfae16daa9193a7" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb" }, { "reference_url": "https://www.openssl.org/news/secadv/20220128.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:29:13Z/" } ], "url": "https://www.openssl.org/news/secadv/20220128.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048651", "reference_id": "2048651", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048651" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4160", "reference_id": "CVE-2021-4160", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4160" }, { "reference_url": "https://security.gentoo.org/glsa/202210-02", "reference_id": "GLSA-202210-02", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:29:13Z/" } ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3bf7b73ea7123045b8f972badc67ed6878e6c37f", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=3bf7b73ea7123045b8f972badc67ed6878e6c37f", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:29:13Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3bf7b73ea7123045b8f972badc67ed6878e6c37f" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6fc1aaaf303185aa5e483e06bdfae16daa9193a7", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=6fc1aaaf303185aa5e483e06bdfae16daa9193a7", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:29:13Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=6fc1aaaf303185aa5e483e06bdfae16daa9193a7" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-24T15:29:13Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9e726506cd2a3fd9c0f12daf8cc1fe934c7dddb" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2021-4160" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-myuq-u3as-g3ah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11076?format=api", "vulnerability_id": "VCID-nr5y-ve9m-zfeh", "summary": "Out-of-bounds Read\nASN.1 strings are represented internally within OpenSSL as an ASN1_STRING structure which contains a buffer holding the string data and a field holding the buffer length. This contrasts with normal C strings which are repesented as a buffer for the string data which is terminated with a NUL (0) byte. Although not a strict requirement, ASN.1 strings that are parsed using OpenSSL's own \"d2i\" functions (and other similar parsing functions) as well as any string whose value has been set with the ASN1_STRING_set() function will additionally NUL terminate the byte array in the ASN1_STRING structure. However, it is possible for applications to directly construct valid ASN1_STRING structures which do not NUL terminate the byte array by directly setting the \"data\" and \"length\" fields in the ASN1_STRING array. This can also happen by using the ASN1_STRING_set0() function. Numerous OpenSSL functions that print ASN.1 data have been found to assume that the ASN1_STRING byte array will be NUL terminated, even though this is not guaranteed for strings that have been directly constructed. Where an application requests an ASN.1 structure to be printed, and where that ASN.1 structure contains ASN1_STRINGs that have been directly constructed by the application without NUL terminating the \"data\" field, then a read buffer overrun can occur. The same thing can also occur during name constraints processing of certificates (for example if a certificate has been directly constructed by the application instead of loading it via the OpenSSL parsing functions, and the certificate contains non NUL terminated ASN1_STRING structures). It can also occur in the X509_get1_email(), X509_REQ_get1_email() and X509_get1_ocsp() functions. If a malicious actor can cause an application to directly construct an ASN1_STRING and then process it through one of the affected OpenSSL functions then this issue could be hit. This might result in a crash (causing a Denial of Service attack). It could also result in the disclosure of private memory contents (such as private keys, or sensitive plaintext). Fixed in OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za (Affected 1.0.2-1.0.2y).", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3712.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3712", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.6151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61531", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61523", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61386", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.6149", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61462", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61508", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00413", "scoring_system": "epss", "scoring_elements": "0.61461", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3712" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-244969.pdf" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3711" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=94d23fcff9b2a7a8368dfe52214d5c2569882c11" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ccb0a11145ee72b042d10593a64eaf9e8a55ec12" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10366" }, { "reference_url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r18995de860f0e63635f3008fd2a6aca82394249476d21691e7c59c9e%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/rad5d9f83f0d11fb3f8bb148d179b8a9ad7c6a17f18d70e5805a713d1%40%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00014.html" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00021.html" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0098.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0098.html" }, { "reference_url": "https://security.gentoo.org/glsa/202209-02", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202209-02" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210827-0010", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210827-0010" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210827-0010/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210827-0010/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4963", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2021/dsa-4963" }, { "reference_url": "https://www.openssl.org/news/secadv/20210824.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.openssl.org/news/secadv/20210824.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "reference_url": "https://www.tenable.com/security/tns-2021-16", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-16" }, { "reference_url": "https://www.tenable.com/security/tns-2022-02", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2022-02" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/08/26/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/08/26/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634", "reference_id": "1995634", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1995634" }, { "reference_url": "https://security.archlinux.org/AVG-2315", "reference_id": "AVG-2315", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2315" }, { "reference_url": "https://security.archlinux.org/AVG-2316", "reference_id": "AVG-2316", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2316" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712", "reference_id": "CVE-2021-3712", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3712" }, { "reference_url": "https://github.com/advisories/GHSA-q9wj-f4qw-6vfj", "reference_id": "GHSA-q9wj-f4qw-6vfj", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-q9wj-f4qw-6vfj" }, { "reference_url": "https://security.gentoo.org/glsa/202210-02", "reference_id": "GLSA-202210-02", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4613", "reference_id": "RHSA-2021:4613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4614", "reference_id": "RHSA-2021:4614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4861", "reference_id": "RHSA-2021:4861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4863", "reference_id": "RHSA-2021:4863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4863" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5226", "reference_id": "RHSA-2021:5226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0064", "reference_id": "RHSA-2022:0064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0064" }, { "reference_url": "https://usn.ubuntu.com/5051-1/", "reference_id": "USN-5051-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5051-1/" }, { "reference_url": "https://usn.ubuntu.com/5051-2/", "reference_id": "USN-5051-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5051-2/" }, { "reference_url": "https://usn.ubuntu.com/5051-3/", "reference_id": "USN-5051-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5051-3/" }, { "reference_url": "https://usn.ubuntu.com/5088-1/", "reference_id": "USN-5088-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5088-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2021-3712", "GHSA-q9wj-f4qw-6vfj" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nr5y-ve9m-zfeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64854?format=api", "vulnerability_id": "VCID-p7ca-uc7n-mfc4", "summary": "openssl: OpenSSL: Information disclosure and data tampering via specific low-level OCB encryption/decryption calls", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69418.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69418.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-69418", "reference_id": "", "reference_type": "", "scores": [ { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.0063", "published_at": "2026-04-04T12:55:00Z" }, { "value": "7e-05", "scoring_system": "epss", "scoring_elements": "0.00638", "published_at": "2026-04-02T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00678", "published_at": "2026-04-13T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00693", "published_at": "2026-04-08T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00685", "published_at": "2026-04-09T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "8e-05", "scoring_system": "epss", "scoring_elements": "0.00679", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-69418" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://openssl-library.org/news/secadv/20260127.txt", "reference_id": "20260127.txt", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:06:43Z/" } ], "url": "https://openssl-library.org/news/secadv/20260127.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430381", "reference_id": "2430381", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430381" }, { "reference_url": "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc", "reference_id": "372fc5c77529695b05b4f5b5187691a57ef5dffc", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:06:43Z/" } ], "url": "https://github.com/openssl/openssl/commit/372fc5c77529695b05b4f5b5187691a57ef5dffc" }, { "reference_url": "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8", "reference_id": "4016975d4469cd6b94927c607f7c511385f928d8", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:06:43Z/" } ], "url": "https://github.com/openssl/openssl/commit/4016975d4469cd6b94927c607f7c511385f928d8" }, { "reference_url": "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347", "reference_id": "52d23c86a54adab5ee9f80e48b242b52c4cc2347", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:06:43Z/" } ], "url": "https://github.com/openssl/openssl/commit/52d23c86a54adab5ee9f80e48b242b52c4cc2347" }, { "reference_url": "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae", "reference_id": "a7589230356d908c0eca4b969ec4f62106f4f5ae", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:06:43Z/" } ], "url": "https://github.com/openssl/openssl/commit/a7589230356d908c0eca4b969ec4f62106f4f5ae" }, { "reference_url": "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977", "reference_id": "ed40856d7d4ba6cb42779b6770666a65f19cb977", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-29T15:06:43Z/" } ], "url": "https://github.com/openssl/openssl/commit/ed40856d7d4ba6cb42779b6770666a65f19cb977" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1472", "reference_id": "RHSA-2026:1472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1473", "reference_id": "RHSA-2026:1473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1736", "reference_id": "RHSA-2026:1736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485", "reference_id": "RHSA-2026:2485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563", "reference_id": "RHSA-2026:2563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3228", "reference_id": "RHSA-2026:3228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943", "reference_id": "RHSA-2026:4943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4943" }, { "reference_url": "https://usn.ubuntu.com/7980-1/", "reference_id": "USN-7980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-1/" }, { "reference_url": "https://usn.ubuntu.com/7980-2/", "reference_id": "USN-7980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2025-69418" ], "risk_score": 1.8, "exploitability": "0.5", "weighted_severity": "3.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p7ca-uc7n-mfc4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/14307?format=api", "vulnerability_id": "VCID-q2ae-5r8q-3fbv", "summary": "Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')\nThe `c_rehash` script does not properly sanitise shell metacharacters to prevent command injection. This script is distributed by some operating systems in a manner where it is automatically executed. On such operating systems, an attacker could execute arbitrary commands with the privileges of the script. Use of the `c_rehash` script is considered obsolete and should be replaced by the OpenSSL `rehash` command line tool.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1292.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-1292.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1292", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.97271", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.97246", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.9727", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.97265", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.97258", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.97252", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.97269", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.97266", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38986", "scoring_system": "epss", "scoring_elements": "0.97257", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-1292" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1292" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=548d3f280a6e737673f5b61fce24bb100108dfeb" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23" }, { "reference_url": "https://www.openssl.org/news/secadv/20220503.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://www.openssl.org/news/secadv/20220503.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081494", "reference_id": "2081494", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2081494" }, { "reference_url": "https://security.archlinux.org/AVG-2702", "reference_id": "AVG-2702", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2702" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1292", "reference_id": "CVE-2022-1292", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1292" }, { "reference_url": "https://www.debian.org/security/2022/dsa-5139", "reference_id": "dsa-5139", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://www.debian.org/security/2022/dsa-5139" }, { "reference_url": "https://security.gentoo.org/glsa/202210-02", "reference_id": "GLSA-202210-02", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://security.gentoo.org/glsa/202210-02" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html", "reference_id": "msg00019.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2022/05/msg00019.html" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=548d3f280a6e737673f5b61fce24bb100108dfeb", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=548d3f280a6e737673f5b61fce24bb100108dfeb", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=548d3f280a6e737673f5b61fce24bb100108dfeb" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e5fd1728ef4c7a5bf7c7a7163ca60370460a6e23" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:5818", "reference_id": "RHSA-2022:5818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:5818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6224", "reference_id": "RHSA-2022:6224", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6224" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8840", "reference_id": "RHSA-2022:8840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8840" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8841", "reference_id": "RHSA-2022:8841", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8913", "reference_id": "RHSA-2022:8913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:8917", "reference_id": "RHSA-2022:8917", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:8917" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5931", "reference_id": "RHSA-2023:5931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5979", "reference_id": "RHSA-2023:5979", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5979" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5980", "reference_id": "RHSA-2023:5980", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5980" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5982", "reference_id": "RHSA-2023:5982", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5982" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:6818", "reference_id": "RHSA-2023:6818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:6818" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0011", "reference_id": "SNWLID-2022-0011", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0011" }, { "reference_url": "https://usn.ubuntu.com/5402-1/", "reference_id": "USN-5402-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5402-1/" }, { "reference_url": "https://usn.ubuntu.com/5402-2/", "reference_id": "USN-5402-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5402-2/" }, { "reference_url": "https://usn.ubuntu.com/6457-1/", "reference_id": "USN-6457-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6457-1/" }, { "reference_url": "https://usn.ubuntu.com/7018-1/", "reference_id": "USN-7018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7018-1/" }, { "reference_url": "https://usn.ubuntu.com/7060-1/", "reference_id": "USN-7060-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7060-1/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/", "reference_id": "VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VX4KWHPMKYJL6ZLW4M5IU7E5UV5ZWJQU/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/", "reference_id": "ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZNU5M7BXMML26G3GPYKFGQYPQDRSNKDD/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" }, { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2022-1292" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q2ae-5r8q-3fbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39445?format=api", "vulnerability_id": "VCID-q6vs-dmwa-9fhh", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which could allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23841.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-23841.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23841", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71222", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71238", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.7123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71216", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71174", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71199", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00665", "scoring_system": "epss", "scoring_elements": "0.71172", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-23841" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/May/67", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2021/May/67" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/May/68", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2021/May/68" }, { "reference_url": "http://seclists.org/fulldisclosure/2021/May/70", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2021/May/70" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/alexcrichton/openssl-src-rs", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/alexcrichton/openssl-src-rs" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a51b9e1d0cf0bf8515f7201b68fb0a3482b3dc1" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9b1129239f3ebb1d1c98ce9ed41d5c9476c47cb2" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44846" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-23841" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0058", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0058" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0058.html" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0009", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0009" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210219-0009/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210219-0009/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210513-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210513-0002" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210513-0002/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "reference_url": "https://support.apple.com/kb/HT212528", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://support.apple.com/kb/HT212528" }, { "reference_url": "https://support.apple.com/kb/HT212529", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://support.apple.com/kb/HT212529" }, { "reference_url": "https://support.apple.com/kb/HT212534", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://support.apple.com/kb/HT212534" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4855", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://www.debian.org/security/2021/dsa-4855" }, { "reference_url": "https://www.openssl.org/news/secadv/20210216.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://www.openssl.org/news/secadv/20210216.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "reference_url": "https://www.tenable.com/security/tns-2021-03", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://www.tenable.com/security/tns-2021-03" }, { "reference_url": "https://www.tenable.com/security/tns-2021-09", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://www.tenable.com/security/tns-2021-09" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310", "reference_id": "1930310", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1930310" }, { "reference_url": "https://security.archlinux.org/ASA-202102-42", "reference_id": "ASA-202102-42", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202102-42" }, { "reference_url": "https://security.archlinux.org/AVG-1581", "reference_id": "AVG-1581", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1581" }, { "reference_url": "https://github.com/advisories/GHSA-84rm-qf37-fgc2", "reference_id": "GHSA-84rm-qf37-fgc2", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-84rm-qf37-fgc2" }, { "reference_url": "https://security.gentoo.org/glsa/202103-03", "reference_id": "GLSA-202103-03", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://security.gentoo.org/glsa/202103-03" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=122a19ab48091c657f7cb1fb3af9fc07bd557bbf" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807", "reference_id": "?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-06-26T20:18:08Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8252ee4d90f3f2004d3d0aeeed003ad49c9a7807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3798", "reference_id": "RHSA-2021:3798", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3798" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4198", "reference_id": "RHSA-2021:4198", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4198" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4424", "reference_id": "RHSA-2021:4424", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4424" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4613", "reference_id": "RHSA-2021:4613", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4613" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4614", "reference_id": "RHSA-2021:4614", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4614" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4861", "reference_id": "RHSA-2021:4861", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4861" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4863", "reference_id": "RHSA-2021:4863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4863" }, { "reference_url": "https://usn.ubuntu.com/4738-1/", "reference_id": "USN-4738-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4738-1/" }, { "reference_url": "https://usn.ubuntu.com/4745-1/", "reference_id": "USN-4745-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4745-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2021-23841", "GHSA-84rm-qf37-fgc2" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q6vs-dmwa-9fhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/90989?format=api", "vulnerability_id": "VCID-qqty-gaxv-ckaf", "summary": "regression update", "references": [], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "DSA-4539-3 openssl" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qqty-gaxv-ckaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64858?format=api", "vulnerability_id": "VCID-rgue-at15-k7a2", "summary": "openssl: OpenSSL: Denial of Service due to type confusion in PKCS#12 file processing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22795.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-22795.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-22795", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05603", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.0562", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05645", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00021", "scoring_system": "epss", "scoring_elements": "0.05609", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06481", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00024", "scoring_system": "epss", "scoring_elements": "0.06509", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-22795" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://openssl-library.org/news/secadv/20260127.txt", "reference_id": "20260127.txt", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T20:03:18Z/" } ], "url": "https://openssl-library.org/news/secadv/20260127.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430389", "reference_id": "2430389", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430389" }, { "reference_url": "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4", "reference_id": "2502e7b7d4c0cf4f972a881641fe09edc67aeec4", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T20:03:18Z/" } ], "url": "https://github.com/openssl/openssl/commit/2502e7b7d4c0cf4f972a881641fe09edc67aeec4" }, { "reference_url": "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49", "reference_id": "572844beca95068394c916626a6d3a490f831a49", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T20:03:18Z/" } ], "url": "https://github.com/openssl/openssl/commit/572844beca95068394c916626a6d3a490f831a49" }, { "reference_url": "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12", "reference_id": "7bbca05be55b129651d9df4bdb92becc45002c12", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T20:03:18Z/" } ], "url": "https://github.com/openssl/openssl/commit/7bbca05be55b129651d9df4bdb92becc45002c12" }, { "reference_url": "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e", "reference_id": "eeee3cbd4d682095ed431052f00403004596373e", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T20:03:18Z/" } ], "url": "https://github.com/openssl/openssl/commit/eeee3cbd4d682095ed431052f00403004596373e" }, { "reference_url": "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2", "reference_id": "ef2fb66ec571564d64d1c74a12e388a2a54d05d2", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-28T20:03:18Z/" } ], "url": "https://github.com/openssl/openssl/commit/ef2fb66ec571564d64d1c74a12e388a2a54d05d2" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1472", "reference_id": "RHSA-2026:1472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1473", "reference_id": "RHSA-2026:1473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1736", "reference_id": "RHSA-2026:1736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485", "reference_id": "RHSA-2026:2485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563", "reference_id": "RHSA-2026:2563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3228", "reference_id": "RHSA-2026:3228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943", "reference_id": "RHSA-2026:4943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4943" }, { "reference_url": "https://usn.ubuntu.com/7980-1/", "reference_id": "USN-7980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-1/" }, { "reference_url": "https://usn.ubuntu.com/7980-2/", "reference_id": "USN-7980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2026-22795" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rgue-at15-k7a2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/19698?format=api", "vulnerability_id": "VCID-sn5k-3e59-7ba8", "summary": "Improper Check for Unusual or Exceptional Conditions\nIssue summary: Generating excessively long X9.42 DH keys or checking\nexcessively long X9.42 DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_generate_key() to\ngenerate an X9.42 DH key may experience long delays. Likewise, applications\nthat use DH_check_pub_key(), DH_check_pub_key_ex() or EVP_PKEY_public_check()\nto check an X9.42 DH key or X9.42 DH parameters may experience long delays.\nWhere the key or parameters that are being checked have been obtained from\nan untrusted source this may lead to a Denial of Service.\n\nWhile DH_check() performs all the necessary checks (as of CVE-2023-3817),\nDH_check_pub_key() does not make any of these checks, and is therefore\nvulnerable for excessively large P and Q parameters.\n\nLikewise, while DH_generate_key() performs a check for an excessively large\nP, it does not check for an excessively large Q.\n\nAn application that calls DH_generate_key() or DH_check_pub_key() and\nsupplies a key or parameters obtained from an untrusted source could be\nvulnerable to a Denial of Service attack.\n\nDH_generate_key() and DH_check_pub_key() are also called by a number of\nother OpenSSL functions. An application calling any of those other\nfunctions may similarly be affected. The other functions affected by this\nare DH_check_pub_key_ex(), EVP_PKEY_public_check(), and EVP_PKEY_generate().\n\nAlso vulnerable are the OpenSSL pkey command line application when using the\n\"-pubcheck\" option, as well as the OpenSSL genpkey command line application.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5678.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5678.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5678", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70492", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70482", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70498", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70522", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00638", "scoring_system": "epss", "scoring_elements": "0.70507", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.7097", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.70953", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00656", "scoring_system": "epss", "scoring_elements": "0.70945", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-5678" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5678" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=34efaef6c103d636ab507a0cc34dca4d3aecc055" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=710fee740904b6290fef0dd5536fbcedbc38ff0c" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=db925ae2e65d0d925adef429afc37f75bd1c2017" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=ddeb4b6c6d527e54ce9a99cba785c0f7776e54b6" }, { "reference_url": "https://www.openssl.org/news/secadv/20231106.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T19:42:37Z/" } ], "url": "https://www.openssl.org/news/secadv/20231106.txt" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055473", "reference_id": "1055473", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055473" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248616", "reference_id": "2248616", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248616" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5678", "reference_id": "CVE-2023-5678", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5678" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7877", "reference_id": "RHSA-2023:7877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0154", "reference_id": "RHSA-2024:0154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0208", "reference_id": "RHSA-2024:0208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1316", "reference_id": "RHSA-2024:1316", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1316" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1317", "reference_id": "RHSA-2024:1317", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1317" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1318", "reference_id": "RHSA-2024:1318", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1318" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1319", "reference_id": "RHSA-2024:1319", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1319" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1325", "reference_id": "RHSA-2024:1325", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2447", "reference_id": "RHSA-2024:2447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2447" }, { "reference_url": "https://usn.ubuntu.com/6622-1/", "reference_id": "USN-6622-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6622-1/" }, { "reference_url": "https://usn.ubuntu.com/6632-1/", "reference_id": "USN-6632-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6632-1/" }, { "reference_url": "https://usn.ubuntu.com/6709-1/", "reference_id": "USN-6709-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6709-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2023-5678" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sn5k-3e59-7ba8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/18438?format=api", "vulnerability_id": "VCID-vhkt-tbz6-wuf7", "summary": "Inefficient Regular Expression Complexity\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3446.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3446.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3446", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00937", "scoring_system": "epss", "scoring_elements": "0.76138", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00937", "scoring_system": "epss", "scoring_elements": "0.76196", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00937", "scoring_system": "epss", "scoring_elements": "0.76171", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00937", "scoring_system": "epss", "scoring_elements": "0.76151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00937", "scoring_system": "epss", "scoring_elements": "0.76184", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00937", "scoring_system": "epss", "scoring_elements": "0.76197", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00937", "scoring_system": "epss", "scoring_elements": "0.76222", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00937", "scoring_system": "epss", "scoring_elements": "0.76198", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3446" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23" }, { "reference_url": "https://www.openssl.org/news/secadv/20230719.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/" } ], "url": "https://www.openssl.org/news/secadv/20230719.txt" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/19/4", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/19/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/19/6", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041817", "reference_id": "1041817", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041817" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224962", "reference_id": "2224962", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224962" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3446", "reference_id": "CVE-2023-3446", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3446" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7622", "reference_id": "RHSA-2023:7622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7623", "reference_id": "RHSA-2023:7623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625", "reference_id": "RHSA-2023:7625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626", "reference_id": "RHSA-2023:7626", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7626" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7877", "reference_id": "RHSA-2023:7877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0154", "reference_id": "RHSA-2024:0154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0208", "reference_id": "RHSA-2024:0208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0408", "reference_id": "RHSA-2024:0408", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0408" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0888", "reference_id": "RHSA-2024:0888", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0888" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:1415", "reference_id": "RHSA-2024:1415", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:1415" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2264", "reference_id": "RHSA-2024:2264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2264" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2447", "reference_id": "RHSA-2024:2447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2447" }, { "reference_url": "https://usn.ubuntu.com/6435-1/", "reference_id": "USN-6435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6435-1/" }, { "reference_url": "https://usn.ubuntu.com/6435-2/", "reference_id": "USN-6435-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6435-2/" }, { "reference_url": "https://usn.ubuntu.com/6450-1/", "reference_id": "USN-6450-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6450-1/" }, { "reference_url": "https://usn.ubuntu.com/6709-1/", "reference_id": "USN-6709-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6709-1/" }, { "reference_url": "https://usn.ubuntu.com/7018-1/", "reference_id": "USN-7018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7018-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2023-3446" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vhkt-tbz6-wuf7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64856?format=api", "vulnerability_id": "VCID-w9yg-3dbq-8qge", "summary": "openssl: OpenSSL: Denial of Service via malformed PKCS#12 file processing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69421.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-69421.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-69421", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10003", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09955", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10542", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10428", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10502", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10569", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10598", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10566", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-69421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://openssl-library.org/news/secadv/20260127.txt", "reference_id": "20260127.txt", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T15:17:58Z/" } ], "url": "https://openssl-library.org/news/secadv/20260127.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430387", "reference_id": "2430387", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430387" }, { "reference_url": "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b", "reference_id": "3524a29271f8191b8fd8a5257eb05173982a097b", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T15:17:58Z/" } ], "url": "https://github.com/openssl/openssl/commit/3524a29271f8191b8fd8a5257eb05173982a097b" }, { "reference_url": "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7", "reference_id": "36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T15:17:58Z/" } ], "url": "https://github.com/openssl/openssl/commit/36ecb4960872a4ce04bf6f1e1f4e78d75ec0c0c7" }, { "reference_url": "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd", "reference_id": "4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T15:17:58Z/" } ], "url": "https://github.com/openssl/openssl/commit/4bbc8d41a72c842ce4077a8a3eccd1109aaf74bd" }, { "reference_url": "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3", "reference_id": "643986985cd1c21221f941129d76fe0c2785aeb3", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T15:17:58Z/" } ], "url": "https://github.com/openssl/openssl/commit/643986985cd1c21221f941129d76fe0c2785aeb3" }, { "reference_url": "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c", "reference_id": "a2dbc539f0f9cc63832709fa5aa33ad9495eb19c", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-28T15:17:58Z/" } ], "url": "https://github.com/openssl/openssl/commit/a2dbc539f0f9cc63832709fa5aa33ad9495eb19c" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1472", "reference_id": "RHSA-2026:1472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1473", "reference_id": "RHSA-2026:1473", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1473" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:1736", "reference_id": "RHSA-2026:1736", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:1736" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2485", "reference_id": "RHSA-2026:2485", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:2563", "reference_id": "RHSA-2026:2563", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:2563" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:3228", "reference_id": "RHSA-2026:3228", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:3228" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:4943", "reference_id": "RHSA-2026:4943", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:4943" }, { "reference_url": "https://usn.ubuntu.com/7980-1/", "reference_id": "USN-7980-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-1/" }, { "reference_url": "https://usn.ubuntu.com/7980-2/", "reference_id": "USN-7980-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7980-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1052135?format=api", "purl": "pkg:deb/debian/openssl@3.0.14-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@3.0.14-1~deb12u1" } ], "aliases": [ "CVE-2025-69421" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w9yg-3dbq-8qge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/16373?format=api", "vulnerability_id": "VCID-x2wm-3tk7-wbbv", "summary": "Access of Resource Using Incompatible Type ('Type Confusion')\nThere is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0286.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0286.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0286", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.88474", "scoring_system": "epss", "scoring_elements": "0.99496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.88474", "scoring_system": "epss", "scoring_elements": "0.99495", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.88981", "scoring_system": "epss", "scoring_elements": "0.99526", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.88981", "scoring_system": "epss", "scoring_elements": "0.99525", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.89087", "scoring_system": "epss", "scoring_elements": "0.99528", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.89087", "scoring_system": "epss", "scoring_elements": "0.99529", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-0286" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4304" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" }, { "reference_url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:22Z/" } ], "url": "https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt" }, { "reference_url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:22Z/" } ], "url": "https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/pyca/cryptography", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/pyca/cryptography" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:22Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2c6c9d439b484e1ba9830d8454a34fa4f80fdfe9" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2f7530077e0ef79d98718138716bc51ca0cad658", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:22Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2f7530077e0ef79d98718138716bc51ca0cad658" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fd2af07dc083a350c959147097003a14a5e8ac4d", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:22Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fd2af07dc083a350c959147097003a14a5e8ac4d" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2023-0003" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2023-0006.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2023-0006.html" }, { "reference_url": "https://security.gentoo.org/glsa/202402-08", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:22Z/" } ], "url": "https://security.gentoo.org/glsa/202402-08" }, { "reference_url": "https://www.openssl.org/news/secadv/20230207.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:57:22Z/" } ], "url": "https://www.openssl.org/news/secadv/20230207.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164440", "reference_id": "2164440", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2164440" }, { "reference_url": "https://access.redhat.com/security/cve/cve-2023-0286", "reference_id": "CVE-2023-0286", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/cve-2023-0286" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0286", "reference_id": "CVE-2023-0286", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0286" }, { "reference_url": "https://github.com/advisories/GHSA-x4qr-2fvf-3mr5", "reference_id": "GHSA-x4qr-2fvf-3mr5", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-x4qr-2fvf-3mr5" }, { "reference_url": "https://github.com/pyca/cryptography/security/advisories/GHSA-x4qr-2fvf-3mr5", "reference_id": "GHSA-x4qr-2fvf-3mr5", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" }, { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/pyca/cryptography/security/advisories/GHSA-x4qr-2fvf-3mr5" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:0946", "reference_id": "RHSA-2023:0946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:0946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1199", "reference_id": "RHSA-2023:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1335", "reference_id": "RHSA-2023:1335", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1405", "reference_id": "RHSA-2023:1405", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1405" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1437", "reference_id": "RHSA-2023:1437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1438", "reference_id": "RHSA-2023:1438", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1438" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1439", "reference_id": "RHSA-2023:1439", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1439" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1440", "reference_id": "RHSA-2023:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:1441", "reference_id": "RHSA-2023:1441", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:1441" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2022", "reference_id": "RHSA-2023:2022", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2022" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2165", "reference_id": "RHSA-2023:2165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:2932", "reference_id": "RHSA-2023:2932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:2932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3354", "reference_id": "RHSA-2023:3354", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3354" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3355", "reference_id": "RHSA-2023:3355", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3355" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3420", "reference_id": "RHSA-2023:3420", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3420" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:3421", "reference_id": "RHSA-2023:3421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:3421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4124", "reference_id": "RHSA-2023:4124", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4128", "reference_id": "RHSA-2023:4128", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4128" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4252", "reference_id": "RHSA-2023:4252", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4252" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5209", "reference_id": "RHSA-2023:5209", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5209" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:5136", "reference_id": "RHSA-2024:5136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:5136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:6095", "reference_id": "RHSA-2024:6095", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:6095" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7733", "reference_id": "RHSA-2025:7733", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7733" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7895", "reference_id": "RHSA-2025:7895", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7895" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7937", "reference_id": "RHSA-2025:7937", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7937" }, { "reference_url": "https://usn.ubuntu.com/5844-1/", "reference_id": "USN-5844-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5844-1/" }, { "reference_url": "https://usn.ubuntu.com/5845-1/", "reference_id": "USN-5845-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5845-1/" }, { "reference_url": "https://usn.ubuntu.com/5845-2/", "reference_id": "USN-5845-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5845-2/" }, { "reference_url": "https://usn.ubuntu.com/6564-1/", "reference_id": "USN-6564-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6564-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2023-0286", "GHSA-x4qr-2fvf-3mr5" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x2wm-3tk7-wbbv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/38792?format=api", "vulnerability_id": "VCID-x8uc-src9-6uck", "summary": "Multiple vulnerabilities were found in OpenSSL, the worst of which\n could allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00004.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00011.html" }, { "reference_url": "http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://packetstormsecurity.com/files/157527/OpenSSL-signature_algorithms_cert-Denial-Of-Service.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1967.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1967.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1967", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.67307", "scoring_system": "epss", "scoring_elements": "0.98553", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.67307", "scoring_system": "epss", "scoring_elements": "0.98551", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.67307", "scoring_system": "epss", "scoring_elements": "0.98564", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.67307", "scoring_system": "epss", "scoring_elements": "0.98562", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.67307", "scoring_system": "epss", "scoring_elements": "0.9856", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.67307", "scoring_system": "epss", "scoring_elements": "0.98558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.67307", "scoring_system": "epss", "scoring_elements": "0.98556", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.67307", "scoring_system": "epss", "scoring_elements": "0.98563", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1967" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1967" }, { "reference_url": "http://seclists.org/fulldisclosure/2020/May/5", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://seclists.org/fulldisclosure/2020/May/5" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/irsl/CVE-2020-1967", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/irsl/CVE-2020-1967" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=eb563247aef3e83dda7679c43f9649270462e5b1" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44440" }, { "reference_url": "https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r66ea9c436da150683432db5fbc8beb8ae01886c6459ac30c2cea7345@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r94d6ac3f010a38fccf4f432b12180a13fa1cf303559bd805648c9064@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r9a41e304992ce6aec6585a87842b4f2e692604f5c892c37e3b0587ee@%3Cdev.tomcat.apache.org%3E" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DDHOAATPWJCXRNFMJ2SASDBBNU5RJONY/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EXDDAOWSAIEFQNBHWYE6PPYFV4QXGMCD/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XVEP3LAK4JSPRXFO4QF4GG2IVXADV3SO/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1967", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1967" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2020-0015.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2020-0015.html" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-20:11.openssl.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200424-0003", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20200424-0003" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200424-0003/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20200424-0003/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200717-0004", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20200717-0004" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200717-0004/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20200717-0004/" }, { "reference_url": "https://www.debian.org/security/2020/dsa-4661", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2020/dsa-4661" }, { "reference_url": "https://www.openssl.org/news/secadv/20200421.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.openssl.org/news/secadv/20200421.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_20_05", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_05" }, { "reference_url": "https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_05_OpenSSL" }, { "reference_url": "https://www.tenable.com/security/tns-2020-03", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2020-03" }, { "reference_url": "https://www.tenable.com/security/tns-2020-04", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2020-04" }, { "reference_url": "https://www.tenable.com/security/tns-2020-11", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2020-11" }, { "reference_url": "https://www.tenable.com/security/tns-2021-10", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-10" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2020/04/22/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2020/04/22/2" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823670", "reference_id": "1823670", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1823670" }, { "reference_url": "https://security.archlinux.org/ASA-202004-18", "reference_id": "ASA-202004-18", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202004-18" }, { "reference_url": "https://security.archlinux.org/ASA-202004-19", "reference_id": "ASA-202004-19", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202004-19" }, { "reference_url": "https://security.archlinux.org/AVG-1139", "reference_id": "AVG-1139", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1139" }, { "reference_url": "https://security.archlinux.org/AVG-1142", "reference_id": "AVG-1142", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1142" }, { "reference_url": "https://github.com/advisories/GHSA-jq65-29v4-4x35", "reference_id": "GHSA-jq65-29v4-4x35", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-jq65-29v4-4x35" }, { "reference_url": "https://security.gentoo.org/glsa/202004-10", "reference_id": "GLSA-202004-10", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202004-10" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2020-1967", "GHSA-jq65-29v4-4x35" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x8uc-src9-6uck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/18560?format=api", "vulnerability_id": "VCID-xnhs-4v7t-p3hv", "summary": "Excessive Iteration\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the \"-check\" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3817.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55026", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.5507", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55052", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55028", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55077", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55076", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0032", "scoring_system": "epss", "scoring_elements": "0.55089", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3817" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817" }, { "reference_url": "http://seclists.org/fulldisclosure/2023/Jul/43", "reference_id": "", "reference_type": "", "scores": [], "url": "http://seclists.org/fulldisclosure/2023/Jul/43" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5" }, { "reference_url": "https://www.openssl.org/news/secadv/20230731.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/" } ], "url": "https://www.openssl.org/news/secadv/20230731.txt" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/31/1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2023/07/31/1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2227852", "reference_id": "2227852", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2227852" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3817", "reference_id": "CVE-2023-3817", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3817" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:5931", "reference_id": "RHSA-2023:5931", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:5931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7622", "reference_id": "RHSA-2023:7622", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7623", "reference_id": "RHSA-2023:7623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625", "reference_id": "RHSA-2023:7625", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7625" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626", "reference_id": "RHSA-2023:7626", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7626" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:7877", "reference_id": "RHSA-2023:7877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:7877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0154", "reference_id": "RHSA-2024:0154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:0208", "reference_id": "RHSA-2024:0208", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:0208" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:2447", "reference_id": "RHSA-2024:2447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:2447" }, { "reference_url": "https://usn.ubuntu.com/6435-1/", "reference_id": "USN-6435-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6435-1/" }, { "reference_url": "https://usn.ubuntu.com/6435-2/", "reference_id": "USN-6435-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6435-2/" }, { "reference_url": "https://usn.ubuntu.com/6450-1/", "reference_id": "USN-6450-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6450-1/" }, { "reference_url": "https://usn.ubuntu.com/6709-1/", "reference_id": "USN-6709-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6709-1/" }, { "reference_url": "https://usn.ubuntu.com/7894-1/", "reference_id": "USN-7894-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7894-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1050388?format=api", "purl": "pkg:deb/debian/openssl@1.1.1w-0%2Bdeb11u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-87vs-4p6w-xbgq" }, { "vulnerability": "VCID-8gde-1md7-5yak" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-cef8-2p5t-bff7" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-f2na-rtsu-ffad" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hgvf-vxhr-cye8" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wuwm-ksb1-6qd5" }, { "vulnerability": "VCID-zkc9-huk8-27bc" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1w-0%252Bdeb11u1" } ], "aliases": [ "CVE-2023-3817" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xnhs-4v7t-p3hv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39446?format=api", "vulnerability_id": "VCID-ycu7-vn9v-kyce", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which could allow remote attackers to cause a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3449.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3449.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3449", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08362", "scoring_system": "epss", "scoring_elements": "0.92291", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08362", "scoring_system": "epss", "scoring_elements": "0.92279", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08362", "scoring_system": "epss", "scoring_elements": "0.92277", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08362", "scoring_system": "epss", "scoring_elements": "0.92271", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08362", "scoring_system": "epss", "scoring_elements": "0.92295", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.08362", "scoring_system": "epss", "scoring_elements": "0.92264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.09859", "scoring_system": "epss", "scoring_elements": "0.92986", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.09859", "scoring_system": "epss", "scoring_elements": "0.92988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.09859", "scoring_system": "epss", "scoring_elements": "0.92987", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3449" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-772220.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3449" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/alexcrichton/openssl-src-rs", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/alexcrichton/openssl-src-rs" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fb9fa6b51defd48157eeb207f52181f735d96148" }, { "reference_url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10356" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00029.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3449" }, { "reference_url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0055", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0055" }, { "reference_url": "https://rustsec.org/advisories/RUSTSEC-2021-0055.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://rustsec.org/advisories/RUSTSEC-2021-0055.html" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210326-0006", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210326-0006" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210326-0006/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210326-0006/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210513-0002", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210513-0002" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210513-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210513-0002/" }, { "reference_url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd" }, { "reference_url": "https://www.debian.org/security/2021/dsa-4875", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.debian.org/security/2021/dsa-4875" }, { "reference_url": "https://www.openssl.org/news/secadv/20210325.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.openssl.org/news/secadv/20210325.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuApr2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuApr2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com//security-alerts/cpujul2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com//security-alerts/cpujul2021.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2021.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "reference_url": "https://www.tenable.com/security/tns-2021-05", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-05" }, { "reference_url": "https://www.tenable.com/security/tns-2021-06", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-06" }, { "reference_url": "https://www.tenable.com/security/tns-2021-09", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-09" }, { "reference_url": "https://www.tenable.com/security/tns-2021-10", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.tenable.com/security/tns-2021-10" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/03/27/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/03/27/1" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/03/27/2", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/03/27/2" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/03/28/3", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/03/28/3" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2021/03/28/4", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.openwall.com/lists/oss-security/2021/03/28/4" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554", "reference_id": "1941554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941554" }, { "reference_url": "https://security.archlinux.org/ASA-202103-10", "reference_id": "ASA-202103-10", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202103-10" }, { "reference_url": "https://security.archlinux.org/AVG-1736", "reference_id": "AVG-1736", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1736" }, { "reference_url": "https://github.com/advisories/GHSA-83mx-573x-5rw9", "reference_id": "GHSA-83mx-573x-5rw9", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-83mx-573x-5rw9" }, { "reference_url": "https://security.gentoo.org/glsa/202103-03", "reference_id": "GLSA-202103-03", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/202103-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1024", "reference_id": "RHSA-2021:1024", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1024" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1063", "reference_id": "RHSA-2021:1063", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1063" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1131", "reference_id": "RHSA-2021:1131", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1131" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1189", "reference_id": "RHSA-2021:1189", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1189" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1195", "reference_id": "RHSA-2021:1195", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1195" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1196", "reference_id": "RHSA-2021:1196", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1196" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1199", "reference_id": "RHSA-2021:1199", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1199" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1200", "reference_id": "RHSA-2021:1200", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1200" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1202", "reference_id": "RHSA-2021:1202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1203", "reference_id": "RHSA-2021:1203", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1203" }, { "reference_url": "https://usn.ubuntu.com/4891-1/", "reference_id": "USN-4891-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4891-1/" }, { "reference_url": "https://usn.ubuntu.com/5038-1/", "reference_id": "USN-5038-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5038-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2021-3449", "GHSA-83mx-573x-5rw9" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ycu7-vn9v-kyce" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58103?format=api", "vulnerability_id": "VCID-yqkw-e99v-jbgt", "summary": "A vulnerability in OpenSSL might allow remote attackers to cause a\n Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1971.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1971.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1971", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56388", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56419", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56432", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00335", "scoring_system": "epss", "scoring_elements": "0.56407", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.5734", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57362", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57339", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.5739", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57258", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1971" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.openssl.org/news/secadv/20201208.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20201208.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409", "reference_id": "1903409", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903409" }, { "reference_url": "https://security.archlinux.org/ASA-202012-24", "reference_id": "ASA-202012-24", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202012-24" }, { "reference_url": "https://security.archlinux.org/AVG-1335", "reference_id": "AVG-1335", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1335" }, { "reference_url": "https://security.archlinux.org/AVG-1404", "reference_id": "AVG-1404", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1404" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971", "reference_id": "CVE-2020-1971", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1971" }, { "reference_url": "https://security.gentoo.org/glsa/202012-13", "reference_id": "GLSA-202012-13", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202012-13" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5422", "reference_id": "RHSA-2020:5422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5476", "reference_id": "RHSA-2020:5476", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5476" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5566", "reference_id": "RHSA-2020:5566", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5566" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5588", "reference_id": "RHSA-2020:5588", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5588" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5623", "reference_id": "RHSA-2020:5623", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5637", "reference_id": "RHSA-2020:5637", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5637" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5639", "reference_id": "RHSA-2020:5639", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5639" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5640", "reference_id": "RHSA-2020:5640", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5640" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5641", "reference_id": "RHSA-2020:5641", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5641" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:5642", "reference_id": "RHSA-2020:5642", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:5642" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0056", "reference_id": "RHSA-2021:0056", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0486", "reference_id": "RHSA-2021:0486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0488", "reference_id": "RHSA-2021:0488", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0488" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0489", "reference_id": "RHSA-2021:0489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0491", "reference_id": "RHSA-2021:0491", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0491" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0494", "reference_id": "RHSA-2021:0494", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0494" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0495", "reference_id": "RHSA-2021:0495", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0495" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0949", "reference_id": "RHSA-2021:0949", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0949" }, { "reference_url": "https://usn.ubuntu.com/4662-1/", "reference_id": "USN-4662-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4662-1/" }, { "reference_url": "https://usn.ubuntu.com/4745-1/", "reference_id": "USN-4745-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4745-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2020-1971" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yqkw-e99v-jbgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39186?format=api", "vulnerability_id": "VCID-yw4y-nz73-w7gq", "summary": "Multiple information disclosure vulnerabilities in OpenSSL allow\n attackers to obtain sensitive information.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" }, { "reference_url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1563.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1563.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1563", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78246", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.7821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78242", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78267", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79522", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79528", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.7955", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=08229ad838c50f644d7e928e2eef147b4308ad64", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=08229ad838c50f644d7e928e2eef147b4308ad64" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=631f94db0065c78181ca9ba5546ebc8bb3884b97", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=631f94db0065c78181ca9ba5546ebc8bb3884b97" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Oct/0" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Oct/1" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/25", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/25" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190919-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190919-0002/" }, { "reference_url": "https://support.f5.com/csp/article/K97324400?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K97324400?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4539" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4540" }, { "reference_url": "https://www.openssl.org/news/secadv/20190910.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20190910.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://www.tenable.com/security/tns-2019-09", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2019-09" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752100", "reference_id": "1752100", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752100" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1563", "reference_id": "CVE-2019-1563", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1563" }, { "reference_url": "https://security.gentoo.org/glsa/201911-04", "reference_id": "GLSA-201911-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201911-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1336", "reference_id": "RHSA-2020:1336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1337", "reference_id": "RHSA-2020:1337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1840", "reference_id": "RHSA-2020:1840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1840" }, { "reference_url": "https://usn.ubuntu.com/4376-1/", "reference_id": "USN-4376-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4376-1/" }, { "reference_url": "https://usn.ubuntu.com/4376-2/", "reference_id": "USN-4376-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4376-2/" }, { "reference_url": "https://usn.ubuntu.com/4504-1/", "reference_id": "USN-4504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2019-1563" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yw4y-nz73-w7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34887?format=api", "vulnerability_id": "VCID-z3fb-nqcp-g3fq", "summary": "Multiple Information Disclosure vulnerabilities in OpenSSL allow\n attackers to obtain sensitive information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5407.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5407.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70564", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70573", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70618", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70634", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74773", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695", "reference_id": "1645695", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695" }, { "reference_url": "https://github.com/bbbrumley/portsmash/tree/e3e7447ba04e1a8a5637cabadf3403faf94f7a56", "reference_id": "CVE-2018-5407", "reference_type": "exploit", "scores": [], "url": "https://github.com/bbbrumley/portsmash/tree/e3e7447ba04e1a8a5637cabadf3403faf94f7a56" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/local/45785.md", "reference_id": "CVE-2018-5407", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/local/45785.md" }, { "reference_url": "https://security.gentoo.org/glsa/201903-10", "reference_id": "GLSA-201903-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0483", "reference_id": "RHSA-2019:0483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2125", "reference_id": "RHSA-2019:2125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3932", "reference_id": "RHSA-2019:3932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3933", "reference_id": "RHSA-2019:3933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3935", "reference_id": "RHSA-2019:3935", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "reference_url": "https://usn.ubuntu.com/3840-1/", "reference_id": "USN-3840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3840-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2018-5407" ], "risk_score": 8.6, "exploitability": "2.0", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3fb-nqcp-g3fq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73028?format=api", "vulnerability_id": "VCID-zfwq-vtun-y3gm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0735.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0735.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91461", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91487", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91493", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91495", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91453", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91468", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07705", "scoring_system": "epss", "scoring_elements": "0.9192", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644356", "reference_id": "1644356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644356" }, { "reference_url": "https://security.archlinux.org/ASA-201812-5", "reference_id": "ASA-201812-5", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-5" }, { "reference_url": "https://security.archlinux.org/ASA-201812-6", "reference_id": "ASA-201812-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-6" }, { "reference_url": "https://security.archlinux.org/AVG-792", "reference_id": "AVG-792", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-792" }, { "reference_url": "https://security.archlinux.org/AVG-793", "reference_id": "AVG-793", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0483", "reference_id": "RHSA-2019:0483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3700", "reference_id": "RHSA-2019:3700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3700" }, { "reference_url": "https://usn.ubuntu.com/3840-1/", "reference_id": "USN-3840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3840-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2018-0735" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zfwq-vtun-y3gm" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/48385?format=api", "vulnerability_id": "VCID-3s4f-e116-j7d7", "summary": "A vulnerability in OpenSSL might allow remote attackers to cause a\n Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1543" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0732.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0732.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99021", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99031", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99022", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99025", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99026", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.78382", "scoring_system": "epss", "scoring_elements": "0.99029", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0732" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-419820.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3984ef0b72831da8b3ece4745cac4f8575b19098" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ea7abeeabf92b7aca160bdd0208636d4da69f4f4" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00043.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EWC42UXL5GHTU5G77VKBF6JYUUNGSHOM/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/august-2018-security-releases/" }, { "reference_url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133", "reference_id": "", "reference_type": "", "scores": [], "url": "https://securityadvisories.paloaltonetworks.com/Home/Detail/133" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20181105-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20181105-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190118-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190118-0002/" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4348", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4348" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4355", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4355" }, { "reference_url": "https://www.openssl.org/news/secadv/20180612.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20180612.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2021.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://www.tenable.com/security/tns-2018-12", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-12" }, { "reference_url": "https://www.tenable.com/security/tns-2018-13", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-13" }, { "reference_url": "https://www.tenable.com/security/tns-2018-14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-14" }, { "reference_url": "https://www.tenable.com/security/tns-2018-17", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-17" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "reference_url": "http://www.securityfocus.com/bid/104442", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/104442" }, { "reference_url": "http://www.securitytracker.com/id/1041090", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1041090" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100", "reference_id": "1591100", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1591100" }, { "reference_url": "https://security.archlinux.org/AVG-674", "reference_id": "AVG-674", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-674" }, { "reference_url": "https://security.archlinux.org/AVG-675", "reference_id": "AVG-675", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-675" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732", "reference_id": "CVE-2018-0732", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0732" }, { "reference_url": "https://security.gentoo.org/glsa/201811-03", "reference_id": "GLSA-201811-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2552", "reference_id": "RHSA-2018:2552", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2552" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2553", "reference_id": "RHSA-2018:2553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3221", "reference_id": "RHSA-2018:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1296", "reference_id": "RHSA-2019:1296", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1296" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1297", "reference_id": "RHSA-2019:1297", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1297" }, { "reference_url": "https://usn.ubuntu.com/3692-1/", "reference_id": "USN-3692-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3692-1/" }, { "reference_url": "https://usn.ubuntu.com/3692-2/", "reference_id": "USN-3692-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3692-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2018-0732" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3s4f-e116-j7d7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34247?format=api", "vulnerability_id": "VCID-4qqa-zm88-w7ca", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which might allow attackers to access sensitive information.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3731.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3731.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3731", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.12609", "scoring_system": "epss", "scoring_elements": "0.93922", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.12609", "scoring_system": "epss", "scoring_elements": "0.93958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.12609", "scoring_system": "epss", "scoring_elements": "0.9394", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.12609", "scoring_system": "epss", "scoring_elements": "0.93943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.12609", "scoring_system": "epss", "scoring_elements": "0.93952", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.12609", "scoring_system": "epss", "scoring_elements": "0.93955", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.12609", "scoring_system": "epss", "scoring_elements": "0.93959", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.12609", "scoring_system": "epss", "scoring_elements": "0.93931", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3731" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20171019-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20171019-0002/" }, { "reference_url": "https://security.paloaltonetworks.com/CVE-2017-3731", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.paloaltonetworks.com/CVE-2017-3731" }, { "reference_url": "https://source.android.com/security/bulletin/pixel/2017-11-01", "reference_id": "", "reference_type": "", "scores": [], "url": "https://source.android.com/security/bulletin/pixel/2017-11-01" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us" }, { "reference_url": "https://www.openssl.org/news/secadv/20170126.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "https://www.tenable.com/security/tns-2017-04", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2017-04" }, { "reference_url": "http://www.debian.org/security/2017/dsa-3773", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2017/dsa-3773" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.securityfocus.com/bid/95813", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95813" }, { "reference_url": "http://www.securitytracker.com/id/1037717", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037717" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852", "reference_id": "1416852", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "reference_url": "https://security.archlinux.org/ASA-201701-36", "reference_id": "ASA-201701-36", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-36" }, { "reference_url": "https://security.archlinux.org/ASA-201701-37", "reference_id": "ASA-201701-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-37" }, { "reference_url": "https://security.archlinux.org/AVG-154", "reference_id": "AVG-154", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-154" }, { "reference_url": "https://security.archlinux.org/AVG-155", "reference_id": "AVG-155", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-155" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731", "reference_id": "CVE-2017-3731", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731" }, { "reference_url": "https://security.gentoo.org/glsa/201702-07", "reference_id": "GLSA-201702-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2017:0286", "reference_id": "RHSA-2017:0286", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2017:0286" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2185", "reference_id": "RHSA-2018:2185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2186", "reference_id": "RHSA-2018:2186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2187", "reference_id": "RHSA-2018:2187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "reference_url": "https://usn.ubuntu.com/3181-1/", "reference_id": "USN-3181-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3181-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035563?format=api", "purl": "pkg:deb/debian/openssl@1.0.1t-1%2Bdeb8u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1f5g-bpbd-xubm" }, { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-33f9-ps96-9bfz" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-4qqa-zm88-w7ca" }, { "vulnerability": "VCID-55px-48g1-jkd4" }, { "vulnerability": "VCID-5aj1-pcam-pbgr" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5bpy-8k6q-5uh9" }, { "vulnerability": "VCID-5q23-97z3-ybhz" }, { "vulnerability": "VCID-5r72-j9mb-rfa4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6csa-4qxe-xbbk" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-77x3-jdm1-sbbr" }, { "vulnerability": "VCID-7jae-7w73-myb5" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8jzs-ygaz-r7c6" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aa9w-ntqw-pfbt" }, { "vulnerability": "VCID-aahy-5hjp-n3f2" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-amuv-hah5-xqeh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-b253-fb1w-yfcn" }, { "vulnerability": "VCID-baa9-1j6z-4yfr" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bgfn-nz3n-6qgg" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-bz8e-e953-b7b1" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-e15t-7nz1-8yhq" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-fakv-qsaf-vyfp" }, { "vulnerability": "VCID-fbj8-csfj-ayec" }, { "vulnerability": "VCID-fcn3-udyh-p7d9" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-fz2f-ge2n-1qcs" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-gz7j-a11r-y3ha" }, { "vulnerability": "VCID-h7td-61b7-q7aw" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-kgyj-s8ch-3kaz" }, { "vulnerability": "VCID-m191-295u-tba7" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-mug7-xnvy-skbn" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-ngyw-a3jk-43hb" }, { "vulnerability": "VCID-nn88-n5r3-hyae" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-nsjj-szaq-1kgd" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-pbjc-7myj-tqas" }, { "vulnerability": "VCID-pfup-gf7w-uqdd" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-q78j-864j-pkbq" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-r616-sqha-pudt" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-rj5g-u4mb-q7df" }, { "vulnerability": "VCID-rrtk-cq5p-fkdg" }, { "vulnerability": "VCID-rv85-x8rf-7ubu" }, { "vulnerability": "VCID-rzqy-gheq-cqgg" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-te2m-dwzt-eff1" }, { "vulnerability": "VCID-tyx8-vuwh-ukhf" }, { "vulnerability": "VCID-ue9p-afzm-8ye6" }, { "vulnerability": "VCID-ut4t-h9gc-cyds" }, { "vulnerability": "VCID-vbc4-wb48-6qfa" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-vqe4-4q4r-aybe" }, { "vulnerability": "VCID-vyur-pwqe-rubw" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wa29-yua6-3kdr" }, { "vulnerability": "VCID-wvqv-zs7x-qqh3" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xbme-7ph4-p3bz" }, { "vulnerability": "VCID-xbzp-nuch-h3hq" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-yba7-p3a3-yydb" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yfky-n79d-cff2" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" }, { "vulnerability": "VCID-zypm-ffez-dqbz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.0.1t-1%252Bdeb8u8" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2017-3731" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4qqa-zm88-w7ca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84781?format=api", "vulnerability_id": "VCID-55px-48g1-jkd4", "summary": "openssl: CMS Null dereference vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7053.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7053.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7053", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77567", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77617", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77644", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77628", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77574", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.77582", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01059", "scoring_system": "epss", "scoring_elements": "0.7761", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7053" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7053", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7053" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us" }, { "reference_url": "https://www.openssl.org/news/secadv/20161110.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20161110.txt" }, { "reference_url": "http://www.securityfocus.com/bid/94244", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94244" }, { "reference_url": "http://www.securitytracker.com/id/1037261", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037261" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393930", "reference_id": "1393930", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393930" }, { "reference_url": "https://security.archlinux.org/AVG-143", "reference_id": "AVG-143", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-143" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7053", "reference_id": "CVE-2016-7053", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7053" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2016-7053" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-55px-48g1-jkd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34889?format=api", "vulnerability_id": "VCID-5q23-97z3-ybhz", "summary": "Multiple Information Disclosure vulnerabilities in OpenSSL allow\n attackers to obtain sensitive information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1559.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1559.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1559", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0496", "scoring_system": "epss", "scoring_elements": "0.89665", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0496", "scoring_system": "epss", "scoring_elements": "0.8966", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0496", "scoring_system": "epss", "scoring_elements": "0.89666", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0496", "scoring_system": "epss", "scoring_elements": "0.89673", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0496", "scoring_system": "epss", "scoring_elements": "0.89671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0496", "scoring_system": "epss", "scoring_elements": "0.89643", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06392", "scoring_system": "epss", "scoring_elements": "0.90978", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06392", "scoring_system": "epss", "scoring_elements": "0.90987", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06392", "scoring_system": "epss", "scoring_elements": "0.90972", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1559" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683804", "reference_id": "1683804", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1683804" }, { "reference_url": "https://security.gentoo.org/glsa/201903-10", "reference_id": "GLSA-201903-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2304", "reference_id": "RHSA-2019:2304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2437", "reference_id": "RHSA-2019:2437", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2437" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2471", "reference_id": "RHSA-2019:2471", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2471" }, { "reference_url": "https://usn.ubuntu.com/3899-1/", "reference_id": "USN-3899-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3899-1/" }, { "reference_url": "https://usn.ubuntu.com/4376-2/", "reference_id": "USN-4376-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4376-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2019-1559" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5q23-97z3-ybhz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84780?format=api", "vulnerability_id": "VCID-5r72-j9mb-rfa4", "summary": "openssl: Corrupting larger payloads when using ChaCha20/Poly1305 ciphersuites leads to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7054.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7054.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7054", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20939", "scoring_system": "epss", "scoring_elements": "0.956", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20939", "scoring_system": "epss", "scoring_elements": "0.95635", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20939", "scoring_system": "epss", "scoring_elements": "0.95616", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20939", "scoring_system": "epss", "scoring_elements": "0.95624", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20939", "scoring_system": "epss", "scoring_elements": "0.95628", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20939", "scoring_system": "epss", "scoring_elements": "0.95633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20939", "scoring_system": "epss", "scoring_elements": "0.95608", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20939", "scoring_system": "epss", "scoring_elements": "0.95613", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7054" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7054", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7054" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us" }, { "reference_url": "https://www.exploit-db.com/exploits/40899/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/40899/" }, { "reference_url": "https://www.openssl.org/news/secadv/20161110.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20161110.txt" }, { "reference_url": "http://www.securityfocus.com/bid/94238", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94238" }, { "reference_url": "http://www.securitytracker.com/id/1037261", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037261" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393920", "reference_id": "1393920", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393920" }, { "reference_url": "https://security.archlinux.org/AVG-143", "reference_id": "AVG-143", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-143" }, { "reference_url": "https://security.archlinux.org/AVG-144", "reference_id": "AVG-144", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-144" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40899.py", "reference_id": "CVE-2016-7054", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/40899.py" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7054", "reference_id": "CVE-2016-7054", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7054" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2016-7054" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5r72-j9mb-rfa4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/79247?format=api", "vulnerability_id": "VCID-5t48-q1g9-53be", "summary": "security update", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00056.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03572", "scoring_system": "epss", "scoring_elements": "0.87727", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03572", "scoring_system": "epss", "scoring_elements": "0.87735", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03572", "scoring_system": "epss", "scoring_elements": "0.87729", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88148", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88098", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88106", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88122", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0383", "scoring_system": "epss", "scoring_elements": "0.88129", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ee22257b1418438ebaf54df98af4e24f494d1809", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ee22257b1418438ebaf54df98af4e24f494d1809" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f426625b6ae9a7831010750490a5f0ad689c5ba3", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=f426625b6ae9a7831010750490a5f0ad689c5ba3" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Jul/3", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Jul/3" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4475", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4475" }, { "reference_url": "https://www.openssl.org/news/secadv/20190306.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20190306.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695954", "reference_id": "1695954", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1695954" }, { "reference_url": "https://security.archlinux.org/ASA-201906-6", "reference_id": "ASA-201906-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201906-6" }, { "reference_url": "https://security.archlinux.org/ASA-201906-7", "reference_id": "ASA-201906-7", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201906-7" }, { "reference_url": "https://security.archlinux.org/AVG-919", "reference_id": "AVG-919", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-919" }, { "reference_url": "https://security.archlinux.org/AVG-920", "reference_id": "AVG-920", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-920" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1543", "reference_id": "CVE-2019-1543", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1543" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3700", "reference_id": "RHSA-2019:3700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3700" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2019-1543" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5t48-q1g9-53be" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73027?format=api", "vulnerability_id": "VCID-7ygr-6dqp-m3hh", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0734.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0734.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90692", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90742", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.9073", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90736", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90745", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90698", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90709", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06051", "scoring_system": "epss", "scoring_elements": "0.90719", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364", "reference_id": "1644364", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644364" }, { "reference_url": "https://security.archlinux.org/ASA-201812-5", "reference_id": "ASA-201812-5", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-5" }, { "reference_url": "https://security.archlinux.org/ASA-201812-6", "reference_id": "ASA-201812-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-6" }, { "reference_url": "https://security.archlinux.org/AVG-792", "reference_id": "AVG-792", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-792" }, { "reference_url": "https://security.archlinux.org/AVG-793", "reference_id": "AVG-793", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2304", "reference_id": "RHSA-2019:2304", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2304" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3700", "reference_id": "RHSA-2019:3700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3932", "reference_id": "RHSA-2019:3932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3933", "reference_id": "RHSA-2019:3933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3935", "reference_id": "RHSA-2019:3935", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "reference_url": "https://usn.ubuntu.com/3840-1/", "reference_id": "USN-3840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3840-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2018-0734" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ygr-6dqp-m3hh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39184?format=api", "vulnerability_id": "VCID-88p4-kcyt-fbck", "summary": "Multiple information disclosure vulnerabilities in OpenSSL allow\n attackers to obtain sensitive information.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" }, { "reference_url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1547.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1547.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49356", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49294", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49324", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.4935", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49306", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49347", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49374", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.4936", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0026", "scoring_system": "epss", "scoring_elements": "0.49351", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1547" }, { "reference_url": "https://arxiv.org/abs/1909.01785", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://arxiv.org/abs/1909.01785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=21c856b75d81eff61aa63b4f036bb64a85bf6d46" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=30c22fa8b1d840036b8e203585738df62a03cec8" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=7c1709c2da5414f5b6133d00a03fc8c5bf996c7a" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/0", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://seclists.org/bugtraq/2019/Oct/0" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/1", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://seclists.org/bugtraq/2019/Oct/1" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/25", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://seclists.org/bugtraq/2019/Sep/25" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190919-0002/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20190919-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200122-0002/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20200122-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20200416-0003/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20200416-0003/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20240621-0006/", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "reference_url": "https://support.f5.com/csp/article/K73422160?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://support.f5.com/csp/article/K73422160?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4539", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.debian.org/security/2019/dsa-4539" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4540", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.debian.org/security/2019/dsa-4540" }, { "reference_url": "https://www.openssl.org/news/secadv/20190910.txt", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.openssl.org/news/secadv/20190910.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://www.tenable.com/security/tns-2019-08", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.tenable.com/security/tns-2019-08" }, { "reference_url": "https://www.tenable.com/security/tns-2019-09", "reference_id": "", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://www.tenable.com/security/tns-2019-09" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752090", "reference_id": "1752090", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752090" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1547", "reference_id": "CVE-2019-1547", "reference_type": "", "scores": [ { "value": "1.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1547" }, { "reference_url": "https://security.gentoo.org/glsa/201911-04", "reference_id": "GLSA-201911-04", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://security.gentoo.org/glsa/201911-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1336", "reference_id": "RHSA-2020:1336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1337", "reference_id": "RHSA-2020:1337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1840", "reference_id": "RHSA-2020:1840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1840" }, { "reference_url": "https://usn.ubuntu.com/4376-1/", "reference_id": "USN-4376-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://usn.ubuntu.com/4376-1/" }, { "reference_url": "https://usn.ubuntu.com/4376-2/", "reference_id": "USN-4376-2", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://usn.ubuntu.com/4376-2/" }, { "reference_url": "https://usn.ubuntu.com/4504-1/", "reference_id": "USN-4504-1", "reference_type": "", "scores": [ { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-19T19:04:18Z/" } ], "url": "https://usn.ubuntu.com/4504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2019-1547" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88p4-kcyt-fbck" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50397?format=api", "vulnerability_id": "VCID-aa9w-ntqw-pfbt", "summary": "Multiple vulnerabilities have been discovered in OpenSSL, the worst of which could result in denial of service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1968.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1968.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1968", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.79511", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.79518", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.7954", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.79527", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.79555", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.79563", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.79585", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.79569", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01278", "scoring_system": "epss", "scoring_elements": "0.7956", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-1968" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1968" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://www.openssl.org/news/secadv/20200909.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20200909.txt" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877458", "reference_id": "1877458", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1877458" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1968", "reference_id": "CVE-2020-1968", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-1968" }, { "reference_url": "https://security.gentoo.org/glsa/202210-02", "reference_id": "GLSA-202210-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202210-02" }, { "reference_url": "https://usn.ubuntu.com/4504-1/", "reference_id": "USN-4504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4504-1/" }, { "reference_url": "https://usn.ubuntu.com/7018-1/", "reference_id": "USN-7018-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7018-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2020-1968" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aa9w-ntqw-pfbt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34243?format=api", "vulnerability_id": "VCID-b253-fb1w-yfcn", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which might allow attackers to access sensitive information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7055.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7055.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7055", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87811", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87867", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87822", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87833", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87836", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87857", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87875", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0365", "scoring_system": "epss", "scoring_elements": "0.87868", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-7055" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "reference_url": "https://www.openssl.org/news/secadv/20161110.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20161110.txt" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "https://www.tenable.com/security/tns-2017-04", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2017-04" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.securityfocus.com/bid/94242", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/94242" }, { "reference_url": "http://www.securitytracker.com/id/1037261", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037261" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393929", "reference_id": "1393929", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393929" }, { "reference_url": "https://security.archlinux.org/ASA-201701-36", "reference_id": "ASA-201701-36", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-36" }, { "reference_url": "https://security.archlinux.org/ASA-201701-37", "reference_id": "ASA-201701-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-37" }, { "reference_url": "https://security.archlinux.org/AVG-154", "reference_id": "AVG-154", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-154" }, { "reference_url": "https://security.archlinux.org/AVG-155", "reference_id": "AVG-155", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-155" }, { "reference_url": "https://security.archlinux.org/AVG-67", "reference_id": "AVG-67", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-67" }, { "reference_url": "https://security.archlinux.org/AVG-68", "reference_id": "AVG-68", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-68" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7055", "reference_id": "CVE-2016-7055", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:P" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7055" }, { "reference_url": "https://security.gentoo.org/glsa/201702-07", "reference_id": "GLSA-201702-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-07" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2185", "reference_id": "RHSA-2018:2185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2186", "reference_id": "RHSA-2018:2186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2187", "reference_id": "RHSA-2018:2187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "reference_url": "https://usn.ubuntu.com/3181-1/", "reference_id": "USN-3181-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3181-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2016-7055" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b253-fb1w-yfcn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50373?format=api", "vulnerability_id": "VCID-baa9-1j6z-4yfr", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which may lead to a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3737.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3737.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3737", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.42931", "scoring_system": "epss", "scoring_elements": "0.9746", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.42931", "scoring_system": "epss", "scoring_elements": "0.97484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.42931", "scoring_system": "epss", "scoring_elements": "0.97466", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.42931", "scoring_system": "epss", "scoring_elements": "0.97471", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.42931", "scoring_system": "epss", "scoring_elements": "0.97477", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.42931", "scoring_system": "epss", "scoring_elements": "0.97478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.42931", "scoring_system": "epss", "scoring_elements": "0.97481", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.42931", "scoring_system": "epss", "scoring_elements": "0.97483", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3737" }, { "reference_url": "https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openssl/openssl/commit/898fb884b706aaeb283de4812340bb0bde8476dc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/openssl/openssl/commit/898fb884b706aaeb283de4812340bb0bde8476dc" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20171208-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20171208-0001/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20180117-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20180419-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20180419-0002/" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4065" }, { "reference_url": "https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/" }, { "reference_url": "https://www.openssl.org/news/secadv/20171207.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20171207.txt" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "reference_url": "https://www.tenable.com/security/tns-2017-16", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2017-16" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "http://www.securityfocus.com/bid/102103", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102103" }, { "reference_url": "http://www.securitytracker.com/id/1039978", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039978" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523504", "reference_id": "1523504", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523504" }, { "reference_url": "https://security.archlinux.org/AVG-548", "reference_id": "AVG-548", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-548" }, { "reference_url": "https://security.archlinux.org/AVG-549", "reference_id": "AVG-549", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-549" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3737", "reference_id": "CVE-2017-3737", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3737" }, { "reference_url": "https://security.gentoo.org/glsa/201712-03", "reference_id": "GLSA-201712-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201712-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0998", "reference_id": "RHSA-2018:0998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2185", "reference_id": "RHSA-2018:2185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2186", "reference_id": "RHSA-2018:2186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2187", "reference_id": "RHSA-2018:2187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "reference_url": "https://usn.ubuntu.com/3512-1/", "reference_id": "USN-3512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2017-3737" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-baa9-1j6z-4yfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49828?format=api", "vulnerability_id": "VCID-bgfn-nz3n-6qgg", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which may lead to a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0733.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0733.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0733", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.8447", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.84485", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.84507", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.84509", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.8453", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.84536", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.84555", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.8455", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02235", "scoring_system": "epss", "scoring_elements": "0.84545", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0733" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561260", "reference_id": "1561260", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561260" }, { "reference_url": "https://security.gentoo.org/glsa/201811-21", "reference_id": "GLSA-201811-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-21" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2018-0733" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bgfn-nz3n-6qgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50371?format=api", "vulnerability_id": "VCID-bz8e-e953-b7b1", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which may lead to a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3735.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3735.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3735", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.36888", "scoring_system": "epss", "scoring_elements": "0.97121", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.36888", "scoring_system": "epss", "scoring_elements": "0.97151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.36888", "scoring_system": "epss", "scoring_elements": "0.97128", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.36888", "scoring_system": "epss", "scoring_elements": "0.97135", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.36888", "scoring_system": "epss", "scoring_elements": "0.97145", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.36888", "scoring_system": "epss", "scoring_elements": "0.97149", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N" }, { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486144", "reference_id": "1486144", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1486144" }, { "reference_url": "https://security.archlinux.org/ASA-201711-14", "reference_id": "ASA-201711-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-14" }, { "reference_url": "https://security.archlinux.org/ASA-201711-15", "reference_id": "ASA-201711-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-15" }, { "reference_url": "https://security.archlinux.org/AVG-477", "reference_id": "AVG-477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-477" }, { "reference_url": "https://security.archlinux.org/AVG-478", "reference_id": "AVG-478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-478" }, { "reference_url": "https://security.gentoo.org/glsa/201712-03", "reference_id": "GLSA-201712-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201712-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3221", "reference_id": "RHSA-2018:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3221" }, { "reference_url": "https://usn.ubuntu.com/3475-1/", "reference_id": "USN-3475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3475-1/" }, { "reference_url": "https://usn.ubuntu.com/3611-2/", "reference_id": "USN-3611-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3611-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035563?format=api", "purl": "pkg:deb/debian/openssl@1.0.1t-1%2Bdeb8u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1f5g-bpbd-xubm" }, { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-33f9-ps96-9bfz" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-4qqa-zm88-w7ca" }, { "vulnerability": "VCID-55px-48g1-jkd4" }, { "vulnerability": "VCID-5aj1-pcam-pbgr" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5bpy-8k6q-5uh9" }, { "vulnerability": "VCID-5q23-97z3-ybhz" }, { "vulnerability": "VCID-5r72-j9mb-rfa4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6csa-4qxe-xbbk" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-77x3-jdm1-sbbr" }, { "vulnerability": "VCID-7jae-7w73-myb5" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8jzs-ygaz-r7c6" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aa9w-ntqw-pfbt" }, { "vulnerability": "VCID-aahy-5hjp-n3f2" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-amuv-hah5-xqeh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-b253-fb1w-yfcn" }, { "vulnerability": "VCID-baa9-1j6z-4yfr" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bgfn-nz3n-6qgg" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-bz8e-e953-b7b1" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-e15t-7nz1-8yhq" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-fakv-qsaf-vyfp" }, { "vulnerability": "VCID-fbj8-csfj-ayec" }, { "vulnerability": "VCID-fcn3-udyh-p7d9" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-fz2f-ge2n-1qcs" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-gz7j-a11r-y3ha" }, { "vulnerability": "VCID-h7td-61b7-q7aw" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-kgyj-s8ch-3kaz" }, { "vulnerability": "VCID-m191-295u-tba7" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-mug7-xnvy-skbn" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-ngyw-a3jk-43hb" }, { "vulnerability": "VCID-nn88-n5r3-hyae" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-nsjj-szaq-1kgd" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-pbjc-7myj-tqas" }, { "vulnerability": "VCID-pfup-gf7w-uqdd" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-q78j-864j-pkbq" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-r616-sqha-pudt" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-rj5g-u4mb-q7df" }, { "vulnerability": "VCID-rrtk-cq5p-fkdg" }, { "vulnerability": "VCID-rv85-x8rf-7ubu" }, { "vulnerability": "VCID-rzqy-gheq-cqgg" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-te2m-dwzt-eff1" }, { "vulnerability": "VCID-tyx8-vuwh-ukhf" }, { "vulnerability": "VCID-ue9p-afzm-8ye6" }, { "vulnerability": "VCID-ut4t-h9gc-cyds" }, { "vulnerability": "VCID-vbc4-wb48-6qfa" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-vqe4-4q4r-aybe" }, { "vulnerability": "VCID-vyur-pwqe-rubw" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wa29-yua6-3kdr" }, { "vulnerability": "VCID-wvqv-zs7x-qqh3" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xbme-7ph4-p3bz" }, { "vulnerability": "VCID-xbzp-nuch-h3hq" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-yba7-p3a3-yydb" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yfky-n79d-cff2" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" }, { "vulnerability": "VCID-zypm-ffez-dqbz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.0.1t-1%252Bdeb8u8" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2017-3735" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bz8e-e953-b7b1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84573?format=api", "vulnerability_id": "VCID-fcn3-udyh-p7d9", "summary": "openssl: Encrypt-Then-Mac renegotiation crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3733.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3733.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3733", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86738", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86799", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86807", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86804", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86748", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86768", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86766", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86785", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03097", "scoring_system": "epss", "scoring_elements": "0.86794", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3733" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3733", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3733" }, { "reference_url": "https://github.com/openssl/openssl/commit/4ad93618d26a3ea23d36ad5498ff4f59eff3a4d2", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/openssl/openssl/commit/4ad93618d26a3ea23d36ad5498ff4f59eff3a4d2" }, { "reference_url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03728en_us" }, { "reference_url": "https://www.openssl.org/news/secadv/20170216.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20170216.txt" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.securityfocus.com/bid/96269", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/96269" }, { "reference_url": "http://www.securitytracker.com/id/1037846", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1421695", "reference_id": "1421695", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1421695" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:operations_agent:11.14:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:operations_agent:11.14:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:operations_agent:11.14:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:operations_agent:11.15:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:hp:operations_agent:11.15:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:operations_agent:11.15:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3733", "reference_id": "CVE-2017-3733", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3733" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2017-3733" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fcn3-udyh-p7d9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49829?format=api", "vulnerability_id": "VCID-h7td-61b7-q7aw", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which may lead to a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0737.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0737.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.38121", "scoring_system": "epss", "scoring_elements": "0.97191", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.38121", "scoring_system": "epss", "scoring_elements": "0.97219", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.38121", "scoring_system": "epss", "scoring_elements": "0.97213", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.38121", "scoring_system": "epss", "scoring_elements": "0.97215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.38121", "scoring_system": "epss", "scoring_elements": "0.97218", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.38121", "scoring_system": "epss", "scoring_elements": "0.97197", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.38121", "scoring_system": "epss", "scoring_elements": "0.97202", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.38121", "scoring_system": "epss", "scoring_elements": "0.97204", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253", "reference_id": "1568253", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1568253" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895844", "reference_id": "895844", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=895844" }, { "reference_url": "https://security.archlinux.org/AVG-674", "reference_id": "AVG-674", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-674" }, { "reference_url": "https://security.archlinux.org/AVG-675", "reference_id": "AVG-675", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-675" }, { "reference_url": "https://security.gentoo.org/glsa/201811-21", "reference_id": "GLSA-201811-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-21" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3221", "reference_id": "RHSA-2018:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3932", "reference_id": "RHSA-2019:3932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3933", "reference_id": "RHSA-2019:3933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3935", "reference_id": "RHSA-2019:3935", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "reference_url": "https://usn.ubuntu.com/3628-1/", "reference_id": "USN-3628-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3628-1/" }, { "reference_url": "https://usn.ubuntu.com/3628-2/", "reference_id": "USN-3628-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3628-2/" }, { "reference_url": "https://usn.ubuntu.com/3692-1/", "reference_id": "USN-3692-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3692-1/" }, { "reference_url": "https://usn.ubuntu.com/3692-2/", "reference_id": "USN-3692-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3692-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2018-0737" ], "risk_score": 1.5, "exploitability": "0.5", "weighted_severity": "3.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h7td-61b7-q7aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86541?format=api", "vulnerability_id": "VCID-kgyj-s8ch-3kaz", "summary": "Dual_EC_DRBG: weak pseudo random number generator", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6755.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6755.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6755", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55681", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55793", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55815", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55795", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55846", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5585", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55858", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.55838", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00328", "scoring_system": "epss", "scoring_elements": "0.5582", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2007-6755" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6755", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6755" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1046045", "reference_id": "1046045", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1046045" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2007-6755" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kgyj-s8ch-3kaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50372?format=api", "vulnerability_id": "VCID-q78j-864j-pkbq", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which may lead to a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3736.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3736.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3736", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07129", "scoring_system": "epss", "scoring_elements": "0.91544", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07129", "scoring_system": "epss", "scoring_elements": "0.91534", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07129", "scoring_system": "epss", "scoring_elements": "0.9154", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07129", "scoring_system": "epss", "scoring_elements": "0.91545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07129", "scoring_system": "epss", "scoring_elements": "0.91546", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08849", "scoring_system": "epss", "scoring_elements": "0.92509", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08849", "scoring_system": "epss", "scoring_elements": "0.92514", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08849", "scoring_system": "epss", "scoring_elements": "0.92521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08849", "scoring_system": "epss", "scoring_elements": "0.92523", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3736" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:C/A:N" }, { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20171107-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20171107-0002/" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20180117-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20180117-0002/" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4017", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4017" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4018", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4018" }, { "reference_url": "https://www.openssl.org/news/secadv/20171102.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20171102.txt" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "reference_url": "https://www.tenable.com/security/tns-2017-14", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2017-14" }, { "reference_url": "https://www.tenable.com/security/tns-2017-15", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2017-15" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "reference_url": "http://www.securityfocus.com/bid/101666", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/101666" }, { "reference_url": "http://www.securitytracker.com/id/1039727", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039727" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169", "reference_id": "1509169", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "reference_url": "https://security.archlinux.org/ASA-201711-14", "reference_id": "ASA-201711-14", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-14" }, { "reference_url": "https://security.archlinux.org/ASA-201711-15", "reference_id": "ASA-201711-15", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201711-15" }, { "reference_url": "https://security.archlinux.org/AVG-477", "reference_id": "AVG-477", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-477" }, { "reference_url": "https://security.archlinux.org/AVG-478", "reference_id": "AVG-478", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-478" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736", "reference_id": "CVE-2017-3736", "reference_type": "", "scores": [ { "value": "4.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:S/C:P/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736" }, { "reference_url": "https://security.gentoo.org/glsa/201712-03", "reference_id": "GLSA-201712-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201712-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0998", "reference_id": "RHSA-2018:0998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2185", "reference_id": "RHSA-2018:2185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2186", "reference_id": "RHSA-2018:2186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2187", "reference_id": "RHSA-2018:2187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2568", "reference_id": "RHSA-2018:2568", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2575", "reference_id": "RHSA-2018:2575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2713", "reference_id": "RHSA-2018:2713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "reference_url": "https://usn.ubuntu.com/3475-1/", "reference_id": "USN-3475-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3475-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2017-3736" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q78j-864j-pkbq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47324?format=api", "vulnerability_id": "VCID-ut4t-h9gc-cyds", "summary": "Multiple vulnerabilities have been found in Dropbear, the worst of\n which could result in a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0739.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0739.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0739", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94394", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94433", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94432", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94401", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94415", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94424", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.14445", "scoring_system": "epss", "scoring_elements": "0.94428", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0739" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561266", "reference_id": "1561266", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1561266" }, { "reference_url": "https://security.archlinux.org/ASA-201804-2", "reference_id": "ASA-201804-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201804-2" }, { "reference_url": "https://security.archlinux.org/AVG-540", "reference_id": "AVG-540", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-540" }, { "reference_url": "https://security.gentoo.org/glsa/201811-21", "reference_id": "GLSA-201811-21", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201811-21" }, { "reference_url": "https://security.gentoo.org/glsa/202007-53", "reference_id": "GLSA-202007-53", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202007-53" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3090", "reference_id": "RHSA-2018:3090", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3090" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:3221", "reference_id": "RHSA-2018:3221", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:3221" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0366", "reference_id": "RHSA-2019:0366", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0366" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0367", "reference_id": "RHSA-2019:0367", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0367" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:1711", "reference_id": "RHSA-2019:1711", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:1711" }, { "reference_url": "https://usn.ubuntu.com/3611-1/", "reference_id": "USN-3611-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3611-1/" }, { "reference_url": "https://usn.ubuntu.com/3611-2/", "reference_id": "USN-3611-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3611-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1035563?format=api", "purl": "pkg:deb/debian/openssl@1.0.1t-1%2Bdeb8u8", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1f5g-bpbd-xubm" }, { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-33f9-ps96-9bfz" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-4qqa-zm88-w7ca" }, { "vulnerability": "VCID-55px-48g1-jkd4" }, { "vulnerability": "VCID-5aj1-pcam-pbgr" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5bpy-8k6q-5uh9" }, { "vulnerability": "VCID-5q23-97z3-ybhz" }, { "vulnerability": "VCID-5r72-j9mb-rfa4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6csa-4qxe-xbbk" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-77x3-jdm1-sbbr" }, { "vulnerability": "VCID-7jae-7w73-myb5" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8jzs-ygaz-r7c6" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aa9w-ntqw-pfbt" }, { "vulnerability": "VCID-aahy-5hjp-n3f2" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-amuv-hah5-xqeh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-b253-fb1w-yfcn" }, { "vulnerability": "VCID-baa9-1j6z-4yfr" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bgfn-nz3n-6qgg" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-bz8e-e953-b7b1" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-e15t-7nz1-8yhq" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-fakv-qsaf-vyfp" }, { "vulnerability": "VCID-fbj8-csfj-ayec" }, { "vulnerability": "VCID-fcn3-udyh-p7d9" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-fz2f-ge2n-1qcs" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-gz7j-a11r-y3ha" }, { "vulnerability": "VCID-h7td-61b7-q7aw" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-kgyj-s8ch-3kaz" }, { "vulnerability": "VCID-m191-295u-tba7" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-mug7-xnvy-skbn" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-ngyw-a3jk-43hb" }, { "vulnerability": "VCID-nn88-n5r3-hyae" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-nsjj-szaq-1kgd" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-pbjc-7myj-tqas" }, { "vulnerability": "VCID-pfup-gf7w-uqdd" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-q78j-864j-pkbq" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-r616-sqha-pudt" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-rj5g-u4mb-q7df" }, { "vulnerability": "VCID-rrtk-cq5p-fkdg" }, { "vulnerability": "VCID-rv85-x8rf-7ubu" }, { "vulnerability": "VCID-rzqy-gheq-cqgg" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-te2m-dwzt-eff1" }, { "vulnerability": "VCID-tyx8-vuwh-ukhf" }, { "vulnerability": "VCID-ue9p-afzm-8ye6" }, { "vulnerability": "VCID-ut4t-h9gc-cyds" }, { "vulnerability": "VCID-vbc4-wb48-6qfa" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-vqe4-4q4r-aybe" }, { "vulnerability": "VCID-vyur-pwqe-rubw" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-wa29-yua6-3kdr" }, { "vulnerability": "VCID-wvqv-zs7x-qqh3" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xbme-7ph4-p3bz" }, { "vulnerability": "VCID-xbzp-nuch-h3hq" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-yba7-p3a3-yydb" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yfky-n79d-cff2" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" }, { "vulnerability": "VCID-zypm-ffez-dqbz" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.0.1t-1%252Bdeb8u8" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2018-0739" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ut4t-h9gc-cyds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34245?format=api", "vulnerability_id": "VCID-vbc4-wb48-6qfa", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which might allow attackers to access sensitive information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3730.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3730.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3730", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.97931", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.97952", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.97946", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.9795", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.97951", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.97934", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.97936", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.97939", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.5292", "scoring_system": "epss", "scoring_elements": "0.97944", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3730" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3730", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3730" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:P" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/openssl/openssl/commit/efbe126e3ebb9123ac9d058aa2bb044261342aaa" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us" }, { "reference_url": "https://www.exploit-db.com/exploits/41192/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.exploit-db.com/exploits/41192/" }, { "reference_url": "https://www.openssl.org/news/secadv/20170126.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.securityfocus.com/bid/95812", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95812" }, { "reference_url": "http://www.securitytracker.com/id/1037717", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037717" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416855", "reference_id": "1416855", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416855" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:agile_engineering_data_management:6.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:agile_engineering_data_management:6.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:agile_engineering_data_management:6.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:agile_engineering_data_management:6.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:agile_engineering_data_management:6.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:agile_engineering_data_management:6.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_application_session_controller:3.7.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_application_session_controller:3.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:3.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:communications_operations_monitor:4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/guidovranken/CVE-2017-3730/blob/98cca4c8c706c6b3ff8b6f2fc9fb2e8c956f3263/crash-postfix.c", "reference_id": "CVE-2017-3730", "reference_type": "exploit", "scores": [], "url": "https://github.com/guidovranken/CVE-2017-3730/blob/98cca4c8c706c6b3ff8b6f2fc9fb2e8c956f3263/crash-postfix.c" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41192.c", "reference_id": "CVE-2017-3730", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41192.c" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3730", "reference_id": "CVE-2017-3730", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3730" }, { "reference_url": "https://security.gentoo.org/glsa/201702-07", "reference_id": "GLSA-201702-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-07" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2017-3730" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vbc4-wb48-6qfa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34250?format=api", "vulnerability_id": "VCID-xbzp-nuch-h3hq", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which might allow attackers to access sensitive information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3732.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3732.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3732", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05205", "scoring_system": "epss", "scoring_elements": "0.89931", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05205", "scoring_system": "epss", "scoring_elements": "0.89933", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05205", "scoring_system": "epss", "scoring_elements": "0.8994", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05205", "scoring_system": "epss", "scoring_elements": "0.89938", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07535", "scoring_system": "epss", "scoring_elements": "0.91774", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07535", "scoring_system": "epss", "scoring_elements": "0.91783", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07535", "scoring_system": "epss", "scoring_elements": "0.91789", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07535", "scoring_system": "epss", "scoring_elements": "0.91797", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07535", "scoring_system": "epss", "scoring_elements": "0.9181", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "2.6", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:P/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us" }, { "reference_url": "https://www.openssl.org/news/secadv/20170126.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "https://www.tenable.com/security/tns-2017-04", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2017-04" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "reference_url": "http://www.securityfocus.com/bid/95814", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/95814" }, { "reference_url": "http://www.securitytracker.com/id/1037717", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1037717" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856", "reference_id": "1416856", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "reference_url": "https://security.archlinux.org/ASA-201701-36", "reference_id": "ASA-201701-36", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-36" }, { "reference_url": "https://security.archlinux.org/ASA-201701-37", "reference_id": "ASA-201701-37", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201701-37" }, { "reference_url": "https://security.archlinux.org/AVG-154", "reference_id": "AVG-154", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-154" }, { "reference_url": "https://security.archlinux.org/AVG-155", "reference_id": "AVG-155", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-155" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732", "reference_id": "CVE-2017-3732", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732" }, { "reference_url": "https://security.gentoo.org/glsa/201702-07", "reference_id": "GLSA-201702-07", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201702-07" }, { "reference_url": "https://security.gentoo.org/glsa/201802-04", "reference_id": "GLSA-201802-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201802-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2185", "reference_id": "RHSA-2018:2185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2186", "reference_id": "RHSA-2018:2186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2187", "reference_id": "RHSA-2018:2187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2568", "reference_id": "RHSA-2018:2568", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2575", "reference_id": "RHSA-2018:2575", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2713", "reference_id": "RHSA-2018:2713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "reference_url": "https://usn.ubuntu.com/3181-1/", "reference_id": "USN-3181-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3181-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2017-3732" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xbzp-nuch-h3hq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/50374?format=api", "vulnerability_id": "VCID-yfky-n79d-cff2", "summary": "Multiple vulnerabilities have been found in OpenSSL, the worst of\n which may lead to a Denial of Service condition.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3738.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3738.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3738", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.1413", "scoring_system": "epss", "scoring_elements": "0.94356", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.15507", "scoring_system": "epss", "scoring_elements": "0.94669", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.15507", "scoring_system": "epss", "scoring_elements": "0.94661", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.15507", "scoring_system": "epss", "scoring_elements": "0.94665", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.15507", "scoring_system": "epss", "scoring_elements": "0.94668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.17287", "scoring_system": "epss", "scoring_elements": "0.95004", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.17287", "scoring_system": "epss", "scoring_elements": "0.95015", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.17287", "scoring_system": "epss", "scoring_elements": "0.95016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.17287", "scoring_system": "epss", "scoring_elements": "0.95019", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-3738" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:C/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a" }, { "reference_url": "https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/" }, { "reference_url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20171208-0001/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20171208-0001/" }, { "reference_url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us" }, { "reference_url": "https://www.debian.org/security/2017/dsa-4065", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2017/dsa-4065" }, { "reference_url": "https://www.debian.org/security/2018/dsa-4157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2018/dsa-4157" }, { "reference_url": "https://www.openssl.org/news/secadv/20171207.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20171207.txt" }, { "reference_url": "https://www.openssl.org/news/secadv/20180327.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20180327.txt" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html" }, { "reference_url": "https://www.tenable.com/security/tns-2017-16", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2017-16" }, { "reference_url": "https://www.tenable.com/security/tns-2018-04", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-04" }, { "reference_url": "https://www.tenable.com/security/tns-2018-06", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-06" }, { "reference_url": "https://www.tenable.com/security/tns-2018-07", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2018-07" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "reference_url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "reference_url": "http://www.securityfocus.com/bid/102118", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/102118" }, { "reference_url": "http://www.securitytracker.com/id/1039978", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id/1039978" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523510", "reference_id": "1523510", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523510" }, { "reference_url": "https://security.archlinux.org/ASA-201804-2", "reference_id": "ASA-201804-2", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201804-2" }, { "reference_url": "https://security.archlinux.org/ASA-201804-6", "reference_id": "ASA-201804-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201804-6" }, { "reference_url": "https://security.archlinux.org/AVG-540", "reference_id": "AVG-540", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-540" }, { "reference_url": "https://security.archlinux.org/AVG-551", "reference_id": "AVG-551", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-551" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_id": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0e:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0e:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0e:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0f:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0f:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0f:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0g:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:1.1.0g:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0g:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3738", "reference_id": "CVE-2017-3738", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "5.9", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3738" }, { "reference_url": "https://security.gentoo.org/glsa/201712-03", "reference_id": "GLSA-201712-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201712-03" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:0998", "reference_id": "RHSA-2018:0998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:0998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2185", "reference_id": "RHSA-2018:2185", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2186", "reference_id": "RHSA-2018:2186", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2018:2187", "reference_id": "RHSA-2018:2187", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "reference_url": "https://usn.ubuntu.com/3512-1/", "reference_id": "USN-3512-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3512-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" } ], "aliases": [ "CVE-2017-3738" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yfky-n79d-cff2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39186?format=api", "vulnerability_id": "VCID-yw4y-nz73-w7gq", "summary": "Multiple information disclosure vulnerabilities in OpenSSL allow\n attackers to obtain sensitive information.", "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00054.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00072.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00012.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00016.html" }, { "reference_url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://packetstormsecurity.com/files/154467/Slackware-Security-Advisory-openssl-Updates.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1563.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-1563.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1563", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78246", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.7821", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78242", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78267", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78251", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79522", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.79528", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0128", "scoring_system": "epss", "scoring_elements": "0.7955", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-1563" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1563" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=08229ad838c50f644d7e928e2eef147b4308ad64", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=08229ad838c50f644d7e928e2eef147b4308ad64" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=631f94db0065c78181ca9ba5546ebc8bb3884b97", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=631f94db0065c78181ca9ba5546ebc8bb3884b97" }, { "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f", "reference_id": "", "reference_type": "", "scores": [], "url": "https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e21f8cf78a125cd3c8c0d1a1a6c8bb0b901f893f" }, { "reference_url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365", "reference_id": "", "reference_type": "", "scores": [], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10365" }, { "reference_url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00026.html" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GY6SNRJP2S7Y42GIIDO3HXPNMDYN2U3A/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZN4VVQJ3JDCHGIHV4Y2YTXBYQZ6PWQ7E/" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/0", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Oct/0" }, { "reference_url": "https://seclists.org/bugtraq/2019/Oct/1", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Oct/1" }, { "reference_url": "https://seclists.org/bugtraq/2019/Sep/25", "reference_id": "", "reference_type": "", "scores": [], "url": "https://seclists.org/bugtraq/2019/Sep/25" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20190919-0002/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20190919-0002/" }, { "reference_url": "https://support.f5.com/csp/article/K97324400?utm_source=f5support&%3Butm_medium=RSS", "reference_id": "", "reference_type": "", "scores": [], "url": "https://support.f5.com/csp/article/K97324400?utm_source=f5support&%3Butm_medium=RSS" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4539", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4539" }, { "reference_url": "https://www.debian.org/security/2019/dsa-4540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.debian.org/security/2019/dsa-4540" }, { "reference_url": "https://www.openssl.org/news/secadv/20190910.txt", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.openssl.org/news/secadv/20190910.txt" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuapr2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujan2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujan2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpujul2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/security-alerts/cpuoct2020.html" }, { "reference_url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html" }, { "reference_url": "https://www.tenable.com/security/tns-2019-09", "reference_id": "", "reference_type": "", "scores": [], "url": "https://www.tenable.com/security/tns-2019-09" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752100", "reference_id": "1752100", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1752100" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1563", "reference_id": "CVE-2019-1563", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N" }, { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1563" }, { "reference_url": "https://security.gentoo.org/glsa/201911-04", "reference_id": "GLSA-201911-04", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201911-04" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1336", "reference_id": "RHSA-2020:1336", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1337", "reference_id": "RHSA-2020:1337", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:1840", "reference_id": "RHSA-2020:1840", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:1840" }, { "reference_url": "https://usn.ubuntu.com/4376-1/", "reference_id": "USN-4376-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4376-1/" }, { "reference_url": "https://usn.ubuntu.com/4376-2/", "reference_id": "USN-4376-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4376-2/" }, { "reference_url": "https://usn.ubuntu.com/4504-1/", "reference_id": "USN-4504-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4504-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2019-1563" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yw4y-nz73-w7gq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34887?format=api", "vulnerability_id": "VCID-z3fb-nqcp-g3fq", "summary": "Multiple Information Disclosure vulnerabilities in OpenSSL allow\n attackers to obtain sensitive information.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5407.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-5407.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70564", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70578", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70595", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70573", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70656", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70642", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70618", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00643", "scoring_system": "epss", "scoring_elements": "0.70634", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00844", "scoring_system": "epss", "scoring_elements": "0.74773", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-5407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695", "reference_id": "1645695", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1645695" }, { "reference_url": "https://github.com/bbbrumley/portsmash/tree/e3e7447ba04e1a8a5637cabadf3403faf94f7a56", "reference_id": "CVE-2018-5407", "reference_type": "exploit", "scores": [], "url": "https://github.com/bbbrumley/portsmash/tree/e3e7447ba04e1a8a5637cabadf3403faf94f7a56" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/local/45785.md", "reference_id": "CVE-2018-5407", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/hardware/local/45785.md" }, { "reference_url": "https://security.gentoo.org/glsa/201903-10", "reference_id": "GLSA-201903-10", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201903-10" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0483", "reference_id": "RHSA-2019:0483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2125", "reference_id": "RHSA-2019:2125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3932", "reference_id": "RHSA-2019:3932", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3932" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3933", "reference_id": "RHSA-2019:3933", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3933" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3935", "reference_id": "RHSA-2019:3935", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3935" }, { "reference_url": "https://usn.ubuntu.com/3840-1/", "reference_id": "USN-3840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3840-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2018-5407" ], "risk_score": 8.6, "exploitability": "2.0", "weighted_severity": "4.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z3fb-nqcp-g3fq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73028?format=api", "vulnerability_id": "VCID-zfwq-vtun-y3gm", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0735.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-0735.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91461", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91481", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91487", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91493", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91495", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91453", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07042", "scoring_system": "epss", "scoring_elements": "0.91468", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07705", "scoring_system": "epss", "scoring_elements": "0.9192", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0735" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644356", "reference_id": "1644356", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1644356" }, { "reference_url": "https://security.archlinux.org/ASA-201812-5", "reference_id": "ASA-201812-5", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-5" }, { "reference_url": "https://security.archlinux.org/ASA-201812-6", "reference_id": "ASA-201812-6", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201812-6" }, { "reference_url": "https://security.archlinux.org/AVG-792", "reference_id": "AVG-792", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-792" }, { "reference_url": "https://security.archlinux.org/AVG-793", "reference_id": "AVG-793", "reference_type": "", "scores": [ { "value": "Low", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:0483", "reference_id": "RHSA-2019:0483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:0483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:3700", "reference_id": "RHSA-2019:3700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:3700" }, { "reference_url": "https://usn.ubuntu.com/3840-1/", "reference_id": "USN-3840-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3840-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1037146?format=api", "purl": "pkg:deb/debian/openssl@1.1.0l-1~deb9u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-1mkj-94qc-zqgn" }, { "vulnerability": "VCID-3s4f-e116-j7d7" }, { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-5t48-q1g9-53be" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-6ptm-71xf-eqgp" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-7ygr-6dqp-m3hh" }, { "vulnerability": "VCID-88p4-kcyt-fbck" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-bnvh-m5tp-4qcd" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-eqss-dzdc-tkbj" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gsbn-6t86-7kf9" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpd4-t99c-zffu" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-myuq-u3as-g3ah" }, { "vulnerability": "VCID-nr5y-ve9m-zfeh" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-q6vs-dmwa-9fhh" }, { "vulnerability": "VCID-qqty-gaxv-ckaf" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-x8uc-src9-6uck" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" }, { "vulnerability": "VCID-ycu7-vn9v-kyce" }, { "vulnerability": "VCID-yqkw-e99v-jbgt" }, { "vulnerability": "VCID-yw4y-nz73-w7gq" }, { "vulnerability": "VCID-z3fb-nqcp-g3fq" }, { "vulnerability": "VCID-zfwq-vtun-y3gm" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1037947?format=api", "purl": "pkg:deb/debian/openssl@1.1.1n-0%2Bdeb10u3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-5bn8-6xa9-fqe4" }, { "vulnerability": "VCID-6mua-rkdu-87ay" }, { "vulnerability": "VCID-7xwq-vdej-ayg1" }, { "vulnerability": "VCID-8uhr-19zz-n3b7" }, { "vulnerability": "VCID-95ub-7a6n-afdg" }, { "vulnerability": "VCID-9gqm-1tcm-2kga" }, { "vulnerability": "VCID-aens-jq7w-f7bh" }, { "vulnerability": "VCID-antn-nu5a-7yf6" }, { "vulnerability": "VCID-bfv6-sbnh-5uh5" }, { "vulnerability": "VCID-chgr-9utt-kqbp" }, { "vulnerability": "VCID-d83w-756y-3bfv" }, { "vulnerability": "VCID-efpm-7cfa-z7hx" }, { "vulnerability": "VCID-frd6-gt2a-afhv" }, { "vulnerability": "VCID-fwwa-41df-zqfk" }, { "vulnerability": "VCID-gnpm-mnpa-3kdg" }, { "vulnerability": "VCID-gz4c-x1gb-muat" }, { "vulnerability": "VCID-hjgb-ch1w-nbfs" }, { "vulnerability": "VCID-hpev-apm4-sqfw" }, { "vulnerability": "VCID-jq5s-hzam-zfda" }, { "vulnerability": "VCID-mg21-k76s-sqfp" }, { "vulnerability": "VCID-p7ca-uc7n-mfc4" }, { "vulnerability": "VCID-q2ae-5r8q-3fbv" }, { "vulnerability": "VCID-rgue-at15-k7a2" }, { "vulnerability": "VCID-sn5k-3e59-7ba8" }, { "vulnerability": "VCID-vhkt-tbz6-wuf7" }, { "vulnerability": "VCID-w9yg-3dbq-8qge" }, { "vulnerability": "VCID-x2wm-3tk7-wbbv" }, { "vulnerability": "VCID-xnhs-4v7t-p3hv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.1n-0%252Bdeb10u3" } ], "aliases": [ "CVE-2018-0735" ], "risk_score": 2.3, "exploitability": "0.5", "weighted_severity": "4.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zfwq-vtun-y3gm" } ], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openssl@1.1.0l-1~deb9u1" }