Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
Typedeb
Namespacedebian
Namegnutls28
Version3.5.8-5+deb9u5
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.7.9-2+deb12u5
Latest_non_vulnerable_version3.7.9-2+deb12u5
Affected_by_vulnerabilities
0
url VCID-3qcs-1fcj-m3fw
vulnerability_id VCID-3qcs-1fcj-m3fw
summary gnutls: DTLS client hello contains a random value of all zeroes
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
reference_id
reference_type
scores
0
value 0.11487
scoring_system epss
scoring_elements 0.93575
published_at 2026-04-01T12:55:00Z
1
value 0.11487
scoring_system epss
scoring_elements 0.93637
published_at 2026-04-18T12:55:00Z
2
value 0.11487
scoring_system epss
scoring_elements 0.9361
published_at 2026-04-12T12:55:00Z
3
value 0.11487
scoring_system epss
scoring_elements 0.93611
published_at 2026-04-13T12:55:00Z
4
value 0.11487
scoring_system epss
scoring_elements 0.93631
published_at 2026-04-16T12:55:00Z
5
value 0.11487
scoring_system epss
scoring_elements 0.93584
published_at 2026-04-02T12:55:00Z
6
value 0.11487
scoring_system epss
scoring_elements 0.93592
published_at 2026-04-04T12:55:00Z
7
value 0.11487
scoring_system epss
scoring_elements 0.93593
published_at 2026-04-07T12:55:00Z
8
value 0.11487
scoring_system epss
scoring_elements 0.93602
published_at 2026-04-08T12:55:00Z
9
value 0.11487
scoring_system epss
scoring_elements 0.93605
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/960
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/issues/960
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
9
reference_url https://security.gentoo.org/glsa/202004-06
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/202004-06
10
reference_url https://security.netapp.com/advisory/ntap-20200416-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0002/
11
reference_url https://www.debian.org/security/2020/dsa-4652
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4652
12
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
reference_id
reference_type
scores
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
reference_id 1821896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
reference_id 955556
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
reference_id CVE-2020-11501
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
22
reference_url https://access.redhat.com/errata/RHSA-2020:1998
reference_id RHSA-2020:1998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1998
23
reference_url https://usn.ubuntu.com/4322-1/
reference_id USN-4322-1
reference_type
scores
url https://usn.ubuntu.com/4322-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-11501, GNUTLS-SA-2020-03-31
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qcs-1fcj-m3fw
1
url VCID-6fzu-8998-abdk
vulnerability_id VCID-6fzu-8998-abdk
summary
An information disclosure vulnerability in GnuTLS allow remote
    attackers to obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75032
published_at 2026-04-01T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.75074
published_at 2026-04-08T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75034
published_at 2026-04-02T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.75064
published_at 2026-04-04T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-07T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-09T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.75108
published_at 2026-04-11T12:55:00Z
7
value 0.01521
scoring_system epss
scoring_elements 0.81292
published_at 2026-04-16T12:55:00Z
8
value 0.01521
scoring_system epss
scoring_elements 0.81293
published_at 2026-04-18T12:55:00Z
9
value 0.01521
scoring_system epss
scoring_elements 0.81263
published_at 2026-04-12T12:55:00Z
10
value 0.01521
scoring_system epss
scoring_elements 0.81255
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
reference_id 1843723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
reference_id 962289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
6
reference_url https://security.archlinux.org/ASA-202006-2
reference_id ASA-202006-2
reference_type
scores
url https://security.archlinux.org/ASA-202006-2
7
reference_url https://security.archlinux.org/AVG-1177
reference_id AVG-1177
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1177
8
reference_url https://security.gentoo.org/glsa/202006-01
reference_id GLSA-202006-01
reference_type
scores
url https://security.gentoo.org/glsa/202006-01
9
reference_url https://access.redhat.com/errata/RHSA-2020:2637
reference_id RHSA-2020:2637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2637
10
reference_url https://access.redhat.com/errata/RHSA-2020:2638
reference_id RHSA-2020:2638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2638
11
reference_url https://access.redhat.com/errata/RHSA-2020:2639
reference_id RHSA-2020:2639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2639
12
reference_url https://usn.ubuntu.com/4384-1/
reference_id USN-4384-1
reference_type
scores
url https://usn.ubuntu.com/4384-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-13777, GNUTLS-SA-2020-06-03
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fzu-8998-abdk
2
url VCID-86j1-j381-cucy
vulnerability_id VCID-86j1-j381-cucy
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2509.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2509
reference_id
reference_type
scores
0
value 0.00628
scoring_system epss
scoring_elements 0.70295
published_at 2026-04-18T12:55:00Z
1
value 0.00628
scoring_system epss
scoring_elements 0.70257
published_at 2026-04-12T12:55:00Z
2
value 0.00628
scoring_system epss
scoring_elements 0.70245
published_at 2026-04-13T12:55:00Z
3
value 0.00628
scoring_system epss
scoring_elements 0.70286
published_at 2026-04-16T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75712
published_at 2026-04-02T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75743
published_at 2026-04-04T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75722
published_at 2026-04-07T12:55:00Z
7
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
8
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-09T12:55:00Z
9
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
reference_id 004746.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108977
reference_id 2108977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108977
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
reference_id 6FL27JS3VM74YEQU7PGB62USO3KSBYZX
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
7
reference_url https://access.redhat.com/security/cve/CVE-2022-2509
reference_id CVE-2022-2509
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://access.redhat.com/security/cve/CVE-2022-2509
8
reference_url https://www.debian.org/security/2022/dsa-5203
reference_id dsa-5203
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://www.debian.org/security/2022/dsa-5203
9
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
10
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
11
reference_url https://access.redhat.com/errata/RHSA-2022:6854
reference_id RHSA-2022:6854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6854
12
reference_url https://access.redhat.com/errata/RHSA-2022:7105
reference_id RHSA-2022:7105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7105
13
reference_url https://usn.ubuntu.com/5550-1/
reference_id USN-5550-1
reference_type
scores
url https://usn.ubuntu.com/5550-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2022-2509, GNUTLS-SA-2022-07-07
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86j1-j381-cucy
3
url VCID-92x9-x1ep-cqdn
vulnerability_id VCID-92x9-x1ep-cqdn
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28834.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28834
reference_id
reference_type
scores
0
value 0.01705
scoring_system epss
scoring_elements 0.8227
published_at 2026-04-04T12:55:00Z
1
value 0.01705
scoring_system epss
scoring_elements 0.82292
published_at 2026-04-08T12:55:00Z
2
value 0.01705
scoring_system epss
scoring_elements 0.82265
published_at 2026-04-07T12:55:00Z
3
value 0.01705
scoring_system epss
scoring_elements 0.82251
published_at 2026-04-02T12:55:00Z
4
value 0.02294
scoring_system epss
scoring_elements 0.84741
published_at 2026-04-18T12:55:00Z
5
value 0.02294
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-09T12:55:00Z
6
value 0.02294
scoring_system epss
scoring_elements 0.84729
published_at 2026-04-11T12:55:00Z
7
value 0.02294
scoring_system epss
scoring_elements 0.84724
published_at 2026-04-12T12:55:00Z
8
value 0.02294
scoring_system epss
scoring_elements 0.84718
published_at 2026-04-13T12:55:00Z
9
value 0.02294
scoring_system epss
scoring_elements 0.84739
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
reference_id 004845.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067464
reference_id 1067464
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067464
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269228
reference_id 2269228
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269228
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2024-28834
reference_id CVE-2024-28834
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/security/cve/CVE-2024-28834
21
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
22
reference_url https://access.redhat.com/errata/RHSA-2024:1784
reference_id RHSA-2024:1784
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1784
23
reference_url https://access.redhat.com/errata/RHSA-2024:1879
reference_id RHSA-2024:1879
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1879
24
reference_url https://access.redhat.com/errata/RHSA-2024:1997
reference_id RHSA-2024:1997
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1997
25
reference_url https://access.redhat.com/errata/RHSA-2024:2044
reference_id RHSA-2024:2044
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2044
26
reference_url https://access.redhat.com/errata/RHSA-2024:2570
reference_id RHSA-2024:2570
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2570
27
reference_url https://access.redhat.com/errata/RHSA-2024:2889
reference_id RHSA-2024:2889
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2889
28
reference_url https://usn.ubuntu.com/6733-1/
reference_id USN-6733-1
reference_type
scores
url https://usn.ubuntu.com/6733-1/
29
reference_url https://usn.ubuntu.com/6733-2/
reference_id USN-6733-2
reference_type
scores
url https://usn.ubuntu.com/6733-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-28834, GNUTLS-SA-2023-12-04
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92x9-x1ep-cqdn
4
url VCID-9pdw-udwq-6kbz
vulnerability_id VCID-9pdw-udwq-6kbz
summary gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9820.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9820
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02569
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02838
published_at 2026-04-16T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02875
published_at 2026-04-04T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02883
published_at 2026-04-07T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02884
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02907
published_at 2026-04-09T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02879
published_at 2026-04-11T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.0286
published_at 2026-04-12T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02855
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121146
reference_id 1121146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121146
5
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1732
reference_id 1732
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1732
6
reference_url https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
reference_id 1d56f96f6ab5034d677136b9d50b5a75dff0faf5
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392528
reference_id 2392528
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2392528
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://access.redhat.com/security/cve/CVE-2025-9820
reference_id CVE-2025-9820
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/security/cve/CVE-2025-9820
22
reference_url https://access.redhat.com/errata/RHSA-2026:3477
reference_id RHSA-2026:3477
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:3477
23
reference_url https://access.redhat.com/errata/RHSA-2026:4188
reference_id RHSA-2026:4188
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4188
24
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4655
25
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4943
26
reference_url https://access.redhat.com/errata/RHSA-2026:5585
reference_id RHSA-2026:5585
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:5585
27
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:5606
28
reference_url https://access.redhat.com/errata/RHSA-2026:7329
reference_id RHSA-2026:7329
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:7329
29
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
reference_id security-new.html#GNUTLS-SA-2025-11-18
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
30
reference_url https://usn.ubuntu.com/8043-1/
reference_id USN-8043-1
reference_type
scores
url https://usn.ubuntu.com/8043-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-9820, GNUTLS-SA-2025-11-18
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pdw-udwq-6kbz
5
url VCID-a18u-4j99-nbf8
vulnerability_id VCID-a18u-4j99-nbf8
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0553.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0553
reference_id
reference_type
scores
0
value 0.01029
scoring_system epss
scoring_elements 0.77345
published_at 2026-04-18T12:55:00Z
1
value 0.01029
scoring_system epss
scoring_elements 0.77262
published_at 2026-04-07T12:55:00Z
2
value 0.01029
scoring_system epss
scoring_elements 0.77294
published_at 2026-04-08T12:55:00Z
3
value 0.01029
scoring_system epss
scoring_elements 0.77302
published_at 2026-04-09T12:55:00Z
4
value 0.01029
scoring_system epss
scoring_elements 0.7733
published_at 2026-04-11T12:55:00Z
5
value 0.01029
scoring_system epss
scoring_elements 0.77309
published_at 2026-04-12T12:55:00Z
6
value 0.01029
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-13T12:55:00Z
7
value 0.01029
scoring_system epss
scoring_elements 0.77346
published_at 2026-04-16T12:55:00Z
8
value 0.01029
scoring_system epss
scoring_elements 0.77252
published_at 2026-04-02T12:55:00Z
9
value 0.01029
scoring_system epss
scoring_elements 0.7728
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
reference_id 004841.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061046
reference_id 1061046
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061046
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1522
reference_id 1522
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1522
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258412
reference_id 2258412
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258412
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_id cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0553
reference_id CVE-2024-0553
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/security/cve/CVE-2024-0553
23
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
24
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0533
25
reference_url https://access.redhat.com/errata/RHSA-2024:0627
reference_id RHSA-2024:0627
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0627
26
reference_url https://access.redhat.com/errata/RHSA-2024:0796
reference_id RHSA-2024:0796
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0796
27
reference_url https://access.redhat.com/errata/RHSA-2024:1082
reference_id RHSA-2024:1082
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1082
28
reference_url https://access.redhat.com/errata/RHSA-2024:1108
reference_id RHSA-2024:1108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1108
29
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1383
30
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:2094
31
reference_url https://usn.ubuntu.com/6593-1/
reference_id USN-6593-1
reference_type
scores
url https://usn.ubuntu.com/6593-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2024-0553
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a18u-4j99-nbf8
6
url VCID-a296-a2f2-kfba
vulnerability_id VCID-a296-a2f2-kfba
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3829.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3829.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3829
reference_id
reference_type
scores
0
value 0.02082
scoring_system epss
scoring_elements 0.83926
published_at 2026-04-01T12:55:00Z
1
value 0.02082
scoring_system epss
scoring_elements 0.8402
published_at 2026-04-18T12:55:00Z
2
value 0.02082
scoring_system epss
scoring_elements 0.83988
published_at 2026-04-09T12:55:00Z
3
value 0.02082
scoring_system epss
scoring_elements 0.84004
published_at 2026-04-11T12:55:00Z
4
value 0.02082
scoring_system epss
scoring_elements 0.83998
published_at 2026-04-12T12:55:00Z
5
value 0.02082
scoring_system epss
scoring_elements 0.83994
published_at 2026-04-13T12:55:00Z
6
value 0.02082
scoring_system epss
scoring_elements 0.84018
published_at 2026-04-16T12:55:00Z
7
value 0.02082
scoring_system epss
scoring_elements 0.8394
published_at 2026-04-02T12:55:00Z
8
value 0.02082
scoring_system epss
scoring_elements 0.83956
published_at 2026-04-04T12:55:00Z
9
value 0.02082
scoring_system epss
scoring_elements 0.83958
published_at 2026-04-07T12:55:00Z
10
value 0.02082
scoring_system epss
scoring_elements 0.83982
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3829
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://gitlab.com/gnutls/gnutls/issues/694
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/issues/694
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7TJIBRJWGWSH6XIO2MXIQ3W6ES4R6I4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7TJIBRJWGWSH6XIO2MXIQ3W6ES4R6I4/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WRSOL66LHP4SD3Y2ECJDOGT4K663ECDU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WRSOL66LHP4SD3Y2ECJDOGT4K663ECDU/
10
reference_url https://security.netapp.com/advisory/ntap-20190619-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190619-0004/
11
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
reference_id
reference_type
scores
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1677048
reference_id 1677048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1677048
13
reference_url https://security.archlinux.org/ASA-201904-2
reference_id ASA-201904-2
reference_type
scores
url https://security.archlinux.org/ASA-201904-2
14
reference_url https://security.archlinux.org/AVG-945
reference_id AVG-945
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-945
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3829
reference_id CVE-2019-3829
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3829
18
reference_url https://security.gentoo.org/glsa/201904-14
reference_id GLSA-201904-14
reference_type
scores
url https://security.gentoo.org/glsa/201904-14
19
reference_url https://access.redhat.com/errata/RHSA-2019:3600
reference_id RHSA-2019:3600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3600
20
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2019-3829
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a296-a2f2-kfba
7
url VCID-abn3-2b4q-z7ga
vulnerability_id VCID-abn3-2b4q-z7ga
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5981.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5981.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5981
reference_id
reference_type
scores
0
value 0.00916
scoring_system epss
scoring_elements 0.75849
published_at 2026-04-02T12:55:00Z
1
value 0.00916
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-04T12:55:00Z
2
value 0.00916
scoring_system epss
scoring_elements 0.75861
published_at 2026-04-07T12:55:00Z
3
value 0.00916
scoring_system epss
scoring_elements 0.75893
published_at 2026-04-08T12:55:00Z
4
value 0.00916
scoring_system epss
scoring_elements 0.75906
published_at 2026-04-09T12:55:00Z
5
value 0.00916
scoring_system epss
scoring_elements 0.75929
published_at 2026-04-11T12:55:00Z
6
value 0.00916
scoring_system epss
scoring_elements 0.75911
published_at 2026-04-12T12:55:00Z
7
value 0.00916
scoring_system epss
scoring_elements 0.75904
published_at 2026-04-13T12:55:00Z
8
value 0.00916
scoring_system epss
scoring_elements 0.75942
published_at 2026-04-16T12:55:00Z
9
value 0.00916
scoring_system epss
scoring_elements 0.75944
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5981
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056188
reference_id 1056188
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056188
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2248445
reference_id 2248445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2248445
6
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
7
reference_url https://access.redhat.com/errata/RHSA-2024:0155
reference_id RHSA-2024:0155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0155
8
reference_url https://access.redhat.com/errata/RHSA-2024:0319
reference_id RHSA-2024:0319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0319
9
reference_url https://access.redhat.com/errata/RHSA-2024:0399
reference_id RHSA-2024:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0399
10
reference_url https://access.redhat.com/errata/RHSA-2024:0451
reference_id RHSA-2024:0451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0451
11
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0533
12
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
13
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
14
reference_url https://usn.ubuntu.com/6499-1/
reference_id USN-6499-1
reference_type
scores
url https://usn.ubuntu.com/6499-1/
15
reference_url https://usn.ubuntu.com/6499-2/
reference_id USN-6499-2
reference_type
scores
url https://usn.ubuntu.com/6499-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2023-5981
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-abn3-2b4q-z7ga
8
url VCID-f5c7-jcd9-67hj
vulnerability_id VCID-f5c7-jcd9-67hj
summary gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14831.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14831
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19907
published_at 2026-04-09T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19773
published_at 2026-04-07T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19853
published_at 2026-04-08T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20176
published_at 2026-04-13T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.2028
published_at 2026-04-11T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20235
published_at 2026-04-12T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20169
published_at 2026-04-16T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.20961
published_at 2026-04-02T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.2102
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1773
reference_id 1773
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1773
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423177
reference_id 2423177
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2423177
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9
reference_id cpe:/a:redhat:ai_inference_server:3.2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.3::el9
reference_id cpe:/a:redhat:ai_inference_server:3.3::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.3::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
reference_id cpe:/o:redhat:rhel_eus:9.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-14831
reference_id CVE-2025-14831
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/security/cve/CVE-2025-14831
29
reference_url https://access.redhat.com/errata/RHSA-2026:3477
reference_id RHSA-2026:3477
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:3477
30
reference_url https://access.redhat.com/errata/RHSA-2026:4188
reference_id RHSA-2026:4188
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4188
31
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4655
32
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4943
33
reference_url https://access.redhat.com/errata/RHSA-2026:5585
reference_id RHSA-2026:5585
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:5585
34
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:5606
35
reference_url https://access.redhat.com/errata/RHSA-2026:6618
reference_id RHSA-2026:6618
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6618
36
reference_url https://access.redhat.com/errata/RHSA-2026:6630
reference_id RHSA-2026:6630
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6630
37
reference_url https://access.redhat.com/errata/RHSA-2026:6737
reference_id RHSA-2026:6737
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6737
38
reference_url https://access.redhat.com/errata/RHSA-2026:6738
reference_id RHSA-2026:6738
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6738
39
reference_url https://access.redhat.com/errata/RHSA-2026:7329
reference_id RHSA-2026:7329
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:7329
40
reference_url https://access.redhat.com/errata/RHSA-2026:7335
reference_id RHSA-2026:7335
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:7335
41
reference_url https://access.redhat.com/errata/RHSA-2026:8746
reference_id RHSA-2026:8746
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:8746
42
reference_url https://access.redhat.com/errata/RHSA-2026:8747
reference_id RHSA-2026:8747
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:8747
43
reference_url https://access.redhat.com/errata/RHSA-2026:8748
reference_id RHSA-2026:8748
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:8748
44
reference_url https://usn.ubuntu.com/8043-1/
reference_id USN-8043-1
reference_type
scores
url https://usn.ubuntu.com/8043-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-14831, GNUTLS-SA-2026-02-09-2
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f5c7-jcd9-67hj
9
url VCID-gy9e-81rw-pug2
vulnerability_id VCID-gy9e-81rw-pug2
summary GnuTLS: Null pointer dereference in MD_UPDATE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4209.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4209
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56804
published_at 2026-04-01T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56898
published_at 2026-04-02T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56919
published_at 2026-04-04T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.56895
published_at 2026-04-07T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56947
published_at 2026-04-08T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.5695
published_at 2026-04-09T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56958
published_at 2026-04-11T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56938
published_at 2026-04-12T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56915
published_at 2026-04-13T12:55:00Z
9
value 0.00342
scoring_system epss
scoring_elements 0.56944
published_at 2026-04-16T12:55:00Z
10
value 0.00342
scoring_system epss
scoring_elements 0.56941
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044156
reference_id 2044156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044156
5
reference_url https://usn.ubuntu.com/5550-1/
reference_id USN-5550-1
reference_type
scores
url https://usn.ubuntu.com/5550-1/
6
reference_url https://usn.ubuntu.com/5750-1/
reference_id USN-5750-1
reference_type
scores
url https://usn.ubuntu.com/5750-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-4209
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gy9e-81rw-pug2
10
url VCID-jxjc-vjdc-1yfj
vulnerability_id VCID-jxjc-vjdc-1yfj
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0361.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0361
reference_id
reference_type
scores
0
value 0.03615
scoring_system epss
scoring_elements 0.87746
published_at 2026-04-02T12:55:00Z
1
value 0.03615
scoring_system epss
scoring_elements 0.87759
published_at 2026-04-04T12:55:00Z
2
value 0.03615
scoring_system epss
scoring_elements 0.87762
published_at 2026-04-07T12:55:00Z
3
value 0.03615
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-08T12:55:00Z
4
value 0.03615
scoring_system epss
scoring_elements 0.8779
published_at 2026-04-09T12:55:00Z
5
value 0.03615
scoring_system epss
scoring_elements 0.87801
published_at 2026-04-11T12:55:00Z
6
value 0.03615
scoring_system epss
scoring_elements 0.87795
published_at 2026-04-12T12:55:00Z
7
value 0.03615
scoring_system epss
scoring_elements 0.87794
published_at 2026-04-13T12:55:00Z
8
value 0.03615
scoring_system epss
scoring_elements 0.87808
published_at 2026-04-16T12:55:00Z
9
value 0.03615
scoring_system epss
scoring_elements 0.87807
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162596
reference_id 2162596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162596
5
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
6
reference_url https://access.redhat.com/errata/RHSA-2023:1141
reference_id RHSA-2023:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1141
7
reference_url https://access.redhat.com/errata/RHSA-2023:1200
reference_id RHSA-2023:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1200
8
reference_url https://access.redhat.com/errata/RHSA-2023:1569
reference_id RHSA-2023:1569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1569
9
reference_url https://access.redhat.com/errata/RHSA-2023:3361
reference_id RHSA-2023:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3361
10
reference_url https://usn.ubuntu.com/5901-1/
reference_id USN-5901-1
reference_type
scores
url https://usn.ubuntu.com/5901-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2023-0361
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxjc-vjdc-1yfj
11
url VCID-k31b-6m7s-pffq
vulnerability_id VCID-k31b-6m7s-pffq
summary
A null pointer dereference in GnuTLS might allow attackers to cause
    a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7507.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7507
reference_id
reference_type
scores
0
value 0.00518
scoring_system epss
scoring_elements 0.66662
published_at 2026-04-01T12:55:00Z
1
value 0.00518
scoring_system epss
scoring_elements 0.66789
published_at 2026-04-18T12:55:00Z
2
value 0.00518
scoring_system epss
scoring_elements 0.66741
published_at 2026-04-13T12:55:00Z
3
value 0.00518
scoring_system epss
scoring_elements 0.66775
published_at 2026-04-16T12:55:00Z
4
value 0.00518
scoring_system epss
scoring_elements 0.66702
published_at 2026-04-02T12:55:00Z
5
value 0.00518
scoring_system epss
scoring_elements 0.66728
published_at 2026-04-04T12:55:00Z
6
value 0.00518
scoring_system epss
scoring_elements 0.667
published_at 2026-04-07T12:55:00Z
7
value 0.00518
scoring_system epss
scoring_elements 0.66749
published_at 2026-04-08T12:55:00Z
8
value 0.00518
scoring_system epss
scoring_elements 0.66764
published_at 2026-04-09T12:55:00Z
9
value 0.00518
scoring_system epss
scoring_elements 0.66784
published_at 2026-04-11T12:55:00Z
10
value 0.00518
scoring_system epss
scoring_elements 0.6677
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7507
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1454621
reference_id 1454621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1454621
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864560
reference_id 864560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864560
5
reference_url https://security.archlinux.org/ASA-201706-12
reference_id ASA-201706-12
reference_type
scores
url https://security.archlinux.org/ASA-201706-12
6
reference_url https://security.archlinux.org/ASA-201707-6
reference_id ASA-201707-6
reference_type
scores
url https://security.archlinux.org/ASA-201707-6
7
reference_url https://security.archlinux.org/AVG-294
reference_id AVG-294
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-294
8
reference_url https://security.archlinux.org/AVG-295
reference_id AVG-295
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-295
9
reference_url https://security.gentoo.org/glsa/201710-15
reference_id GLSA-201710-15
reference_type
scores
url https://security.gentoo.org/glsa/201710-15
10
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
11
reference_url https://usn.ubuntu.com/3318-1/
reference_id USN-3318-1
reference_type
scores
url https://usn.ubuntu.com/3318-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2017-7507
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k31b-6m7s-pffq
12
url VCID-k5vv-ts4z-j7g5
vulnerability_id VCID-k5vv-ts4z-j7g5
summary gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
reference_id
reference_type
scores
0
value 0.00844
scoring_system epss
scoring_elements 0.74724
published_at 2026-04-01T12:55:00Z
1
value 0.00844
scoring_system epss
scoring_elements 0.74811
published_at 2026-04-18T12:55:00Z
2
value 0.00844
scoring_system epss
scoring_elements 0.74727
published_at 2026-04-02T12:55:00Z
3
value 0.00844
scoring_system epss
scoring_elements 0.74754
published_at 2026-04-04T12:55:00Z
4
value 0.00844
scoring_system epss
scoring_elements 0.74728
published_at 2026-04-07T12:55:00Z
5
value 0.00844
scoring_system epss
scoring_elements 0.7476
published_at 2026-04-08T12:55:00Z
6
value 0.00844
scoring_system epss
scoring_elements 0.74775
published_at 2026-04-09T12:55:00Z
7
value 0.00844
scoring_system epss
scoring_elements 0.74799
published_at 2026-04-11T12:55:00Z
8
value 0.00844
scoring_system epss
scoring_elements 0.74778
published_at 2026-04-12T12:55:00Z
9
value 0.00844
scoring_system epss
scoring_elements 0.74768
published_at 2026-04-13T12:55:00Z
10
value 0.00844
scoring_system epss
scoring_elements 0.74803
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
reference_id 1922275
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://security.netapp.com/advisory/ntap-20210416-0005/
reference_id ntap-20210416-0005
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://security.netapp.com/advisory/ntap-20210416-0005/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
reference_id OSLAE6PP33A7VYRYMYMUVB3U6B26GZER
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
9
reference_url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_id r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_id r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_id r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_id r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_id r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_id rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_id rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_id rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
17
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
18
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
reference_id security-new.html#GNUTLS-SA-2021-03-10
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
19
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-20232
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5vv-ts4z-j7g5
13
url VCID-pf5n-65mk-2ff3
vulnerability_id VCID-pf5n-65mk-2ff3
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32990.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32990.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32990
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.22023
published_at 2026-04-04T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-16T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.2197
published_at 2026-04-02T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23583
published_at 2026-04-08T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23512
published_at 2026-04-07T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23628
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23645
published_at 2026-04-11T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23603
published_at 2026-04-12T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23546
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32990
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
reference_id 004883.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359620
reference_id 2359620
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359620
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
22
reference_url https://access.redhat.com/security/cve/CVE-2025-32990
reference_id CVE-2025-32990
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/security/cve/CVE-2025-32990
23
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
24
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:16115
25
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:16116
26
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17181
27
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17348
28
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17361
29
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17415
30
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:19088
31
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:22529
32
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
33
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-32990, GNUTLS-SA-2025-07-08-3
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf5n-65mk-2ff3
14
url VCID-q3g5-4xaf-hudf
vulnerability_id VCID-q3g5-4xaf-hudf
summary gnutls: "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10846.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10846
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02447
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02515
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02529
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.0253
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02534
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02555
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02522
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02509
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02513
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582574
reference_id 1582574
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582574
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2018-10846
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3g5-4xaf-hudf
15
url VCID-qp8x-339r-pbhe
vulnerability_id VCID-qp8x-339r-pbhe
summary gnutls: Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification and padding oracle verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16868.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16868
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12801
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12899
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12949
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12752
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12832
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12883
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12849
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12811
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12766
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12669
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12676
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1654929
reference_id 1654929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1654929
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2018-16868
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp8x-339r-pbhe
16
url VCID-qtsh-kn2d-h7cr
vulnerability_id VCID-qtsh-kn2d-h7cr
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28835.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28835
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10776
published_at 2026-04-08T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.107
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1081
published_at 2026-04-02T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13102
published_at 2026-04-18T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13317
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13284
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13246
published_at 2026-04-12T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13197
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
reference_id 004845.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067463
reference_id 1067463
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067463
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269084
reference_id 2269084
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269084
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
15
reference_url https://access.redhat.com/security/cve/CVE-2024-28835
reference_id CVE-2024-28835
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/security/cve/CVE-2024-28835
16
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
17
reference_url https://access.redhat.com/errata/RHSA-2024:1879
reference_id RHSA-2024:1879
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:1879
18
reference_url https://access.redhat.com/errata/RHSA-2024:2570
reference_id RHSA-2024:2570
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:2570
19
reference_url https://access.redhat.com/errata/RHSA-2024:2889
reference_id RHSA-2024:2889
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:2889
20
reference_url https://usn.ubuntu.com/6733-1/
reference_id USN-6733-1
reference_type
scores
url https://usn.ubuntu.com/6733-1/
21
reference_url https://usn.ubuntu.com/6733-2/
reference_id USN-6733-2
reference_type
scores
url https://usn.ubuntu.com/6733-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-28835, GNUTLS-SA-2024-01-23
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtsh-kn2d-h7cr
17
url VCID-r531-qbtt-akgf
vulnerability_id VCID-r531-qbtt-akgf
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3836.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3836.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3836
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.5817
published_at 2026-04-01T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.5832
published_at 2026-04-18T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.5831
published_at 2026-04-09T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58329
published_at 2026-04-11T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58306
published_at 2026-04-12T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58286
published_at 2026-04-13T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58318
published_at 2026-04-16T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58256
published_at 2026-04-02T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58276
published_at 2026-04-04T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58251
published_at 2026-04-07T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58304
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3836
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://gitlab.com/gnutls/gnutls/issues/704
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/issues/704
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
8
reference_url https://security.netapp.com/advisory/ntap-20190502-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190502-0005/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1678411
reference_id 1678411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1678411
10
reference_url https://security.archlinux.org/ASA-201904-2
reference_id ASA-201904-2
reference_type
scores
url https://security.archlinux.org/ASA-201904-2
11
reference_url https://security.archlinux.org/AVG-945
reference_id AVG-945
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-945
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3836
reference_id CVE-2019-3836
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3836
16
reference_url https://security.gentoo.org/glsa/201904-14
reference_id GLSA-201904-14
reference_type
scores
url https://security.gentoo.org/glsa/201904-14
17
reference_url https://access.redhat.com/errata/RHSA-2019:3600
reference_id RHSA-2019:3600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3600
18
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2019-3836
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r531-qbtt-akgf
18
url VCID-sp9u-9wwg-b7e9
vulnerability_id VCID-sp9u-9wwg-b7e9
summary
A flaw was found in GnuTLS, possibly allowing a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24659.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24659
reference_id
reference_type
scores
0
value 0.03633
scoring_system epss
scoring_elements 0.87779
published_at 2026-04-01T12:55:00Z
1
value 0.03633
scoring_system epss
scoring_elements 0.87789
published_at 2026-04-02T12:55:00Z
2
value 0.03633
scoring_system epss
scoring_elements 0.878
published_at 2026-04-04T12:55:00Z
3
value 0.03633
scoring_system epss
scoring_elements 0.87804
published_at 2026-04-07T12:55:00Z
4
value 0.03633
scoring_system epss
scoring_elements 0.87826
published_at 2026-04-08T12:55:00Z
5
value 0.03633
scoring_system epss
scoring_elements 0.87832
published_at 2026-04-09T12:55:00Z
6
value 0.03633
scoring_system epss
scoring_elements 0.87844
published_at 2026-04-11T12:55:00Z
7
value 0.03633
scoring_system epss
scoring_elements 0.87838
published_at 2026-04-12T12:55:00Z
8
value 0.03633
scoring_system epss
scoring_elements 0.87837
published_at 2026-04-13T12:55:00Z
9
value 0.03633
scoring_system epss
scoring_elements 0.87851
published_at 2026-04-16T12:55:00Z
10
value 0.03633
scoring_system epss
scoring_elements 0.87849
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872021
reference_id 1872021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872021
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969547
reference_id 969547
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969547
6
reference_url https://security.gentoo.org/glsa/202009-01
reference_id GLSA-202009-01
reference_type
scores
url https://security.gentoo.org/glsa/202009-01
7
reference_url https://access.redhat.com/errata/RHSA-2020:5483
reference_id RHSA-2020:5483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5483
8
reference_url https://usn.ubuntu.com/4491-1/
reference_id USN-4491-1
reference_type
scores
url https://usn.ubuntu.com/4491-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-24659, GNUTLS-SA-2020-09-04
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sp9u-9wwg-b7e9
19
url VCID-uc8j-r79v-n7ck
vulnerability_id VCID-uc8j-r79v-n7ck
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32988.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32988
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16875
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16932
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19127
published_at 2026-04-09T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19034
published_at 2026-04-13T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19087
published_at 2026-04-12T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19133
published_at 2026-04-11T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.1899
published_at 2026-04-16T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.18994
published_at 2026-04-07T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19074
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
reference_id 004883.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359622
reference_id 2359622
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359622
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
22
reference_url https://access.redhat.com/security/cve/CVE-2025-32988
reference_id CVE-2025-32988
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/security/cve/CVE-2025-32988
23
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
24
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:16115
25
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:16116
26
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17181
27
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17348
28
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17361
29
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17415
30
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:19088
31
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:22529
32
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
33
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-32988, GNUTLS-SA-2025-07-08-2
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uc8j-r79v-n7ck
20
url VCID-uws5-j79f-cbar
vulnerability_id VCID-uws5-j79f-cbar
summary gnutls: Use after free in client key_share extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75866
published_at 2026-04-01T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75915
published_at 2026-04-08T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.7587
published_at 2026-04-02T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75902
published_at 2026-04-04T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75882
published_at 2026-04-07T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75928
published_at 2026-04-09T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.75951
published_at 2026-04-11T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78905
published_at 2026-04-16T12:55:00Z
8
value 0.01195
scoring_system epss
scoring_elements 0.78902
published_at 2026-04-18T12:55:00Z
9
value 0.01195
scoring_system epss
scoring_elements 0.78885
published_at 2026-04-12T12:55:00Z
10
value 0.01195
scoring_system epss
scoring_elements 0.78876
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
reference_id 1922276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
8
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-20231, GNUTLS-SA-2021-03-10
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uws5-j79f-cbar
21
url VCID-vz27-wyaf-tkcr
vulnerability_id VCID-vz27-wyaf-tkcr
summary gnutls: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10845.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10845
reference_id
reference_type
scores
0
value 0.00565
scoring_system epss
scoring_elements 0.68474
published_at 2026-04-18T12:55:00Z
1
value 0.00565
scoring_system epss
scoring_elements 0.68422
published_at 2026-04-13T12:55:00Z
2
value 0.00565
scoring_system epss
scoring_elements 0.68461
published_at 2026-04-16T12:55:00Z
3
value 0.01038
scoring_system epss
scoring_elements 0.77356
published_at 2026-04-02T12:55:00Z
4
value 0.01038
scoring_system epss
scoring_elements 0.77364
published_at 2026-04-07T12:55:00Z
5
value 0.01038
scoring_system epss
scoring_elements 0.77393
published_at 2026-04-08T12:55:00Z
6
value 0.01038
scoring_system epss
scoring_elements 0.77403
published_at 2026-04-09T12:55:00Z
7
value 0.01038
scoring_system epss
scoring_elements 0.77429
published_at 2026-04-11T12:55:00Z
8
value 0.01038
scoring_system epss
scoring_elements 0.77409
published_at 2026-04-12T12:55:00Z
9
value 0.01038
scoring_system epss
scoring_elements 0.7735
published_at 2026-04-01T12:55:00Z
10
value 0.01038
scoring_system epss
scoring_elements 0.77383
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10845
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582572
reference_id 1582572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582572
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2018-10845
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vz27-wyaf-tkcr
22
url VCID-w7f6-5b6h-8kh4
vulnerability_id VCID-w7f6-5b6h-8kh4
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0567.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0567
reference_id
reference_type
scores
0
value 0.01605
scoring_system epss
scoring_elements 0.81758
published_at 2026-04-18T12:55:00Z
1
value 0.01605
scoring_system epss
scoring_elements 0.81691
published_at 2026-04-04T12:55:00Z
2
value 0.01605
scoring_system epss
scoring_elements 0.81688
published_at 2026-04-07T12:55:00Z
3
value 0.01605
scoring_system epss
scoring_elements 0.81715
published_at 2026-04-08T12:55:00Z
4
value 0.01605
scoring_system epss
scoring_elements 0.81719
published_at 2026-04-09T12:55:00Z
5
value 0.01605
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-11T12:55:00Z
6
value 0.01605
scoring_system epss
scoring_elements 0.81727
published_at 2026-04-12T12:55:00Z
7
value 0.01605
scoring_system epss
scoring_elements 0.8172
published_at 2026-04-13T12:55:00Z
8
value 0.01605
scoring_system epss
scoring_elements 0.81668
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
reference_id 004841.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061045
reference_id 1061045
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061045
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1521
reference_id 1521
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1521
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258544
reference_id 2258544
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258544
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
reference_id cpe:/a:redhat:openshift:3.11
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_id cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
19
reference_url https://access.redhat.com/security/cve/CVE-2024-0567
reference_id CVE-2024-0567
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/security/cve/CVE-2024-0567
20
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
21
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:0533
22
reference_url https://access.redhat.com/errata/RHSA-2024:1082
reference_id RHSA-2024:1082
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:1082
23
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:1383
24
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:2094
25
reference_url https://usn.ubuntu.com/6593-1/
reference_id USN-6593-1
reference_type
scores
url https://usn.ubuntu.com/6593-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2024-0567
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7f6-5b6h-8kh4
23
url VCID-wqyp-93bk-vbh2
vulnerability_id VCID-wqyp-93bk-vbh2
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6395.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6395
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20432
published_at 2026-04-04T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20371
published_at 2026-04-02T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22074
published_at 2026-04-16T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22175
published_at 2026-04-11T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22135
published_at 2026-04-12T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22075
published_at 2026-04-13T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22021
published_at 2026-04-07T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22101
published_at 2026-04-08T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376755
reference_id 2376755
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2376755
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2025-6395
reference_id CVE-2025-6395
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/security/cve/CVE-2025-6395
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:16115
23
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:16116
24
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17181
25
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17348
26
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17361
27
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17415
28
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:19088
29
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:22529
30
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
31
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-6395, GNUTLS-SA-2025-07-08-4
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqyp-93bk-vbh2
24
url VCID-x5jd-qddc-eudq
vulnerability_id VCID-x5jd-qddc-eudq
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12243.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-12243
reference_id
reference_type
scores
0
value 0.01689
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-18T12:55:00Z
1
value 0.01689
scoring_system epss
scoring_elements 0.82187
published_at 2026-04-04T12:55:00Z
2
value 0.01689
scoring_system epss
scoring_elements 0.82183
published_at 2026-04-07T12:55:00Z
3
value 0.01689
scoring_system epss
scoring_elements 0.82209
published_at 2026-04-08T12:55:00Z
4
value 0.01689
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-09T12:55:00Z
5
value 0.01689
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-11T12:55:00Z
6
value 0.01689
scoring_system epss
scoring_elements 0.82228
published_at 2026-04-12T12:55:00Z
7
value 0.01689
scoring_system epss
scoring_elements 0.82223
published_at 2026-04-13T12:55:00Z
8
value 0.01689
scoring_system epss
scoring_elements 0.82166
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-12243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1553
reference_id 1553
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1553
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344615
reference_id 2344615
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2344615
6
reference_url https://gitlab.com/gnutls/libtasn1/-/issues/52
reference_id 52
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://gitlab.com/gnutls/libtasn1/-/issues/52
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9
reference_id cpe:/a:redhat:discovery:1.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2024-12243
reference_id CVE-2024-12243
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/security/cve/CVE-2024-12243
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:17361
23
reference_url https://access.redhat.com/errata/RHSA-2025:4051
reference_id RHSA-2025:4051
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:4051
24
reference_url https://access.redhat.com/errata/RHSA-2025:7076
reference_id RHSA-2025:7076
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:7076
25
reference_url https://access.redhat.com/errata/RHSA-2025:8020
reference_id RHSA-2025:8020
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:8020
26
reference_url https://access.redhat.com/errata/RHSA-2025:8385
reference_id RHSA-2025:8385
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:8385
27
reference_url https://usn.ubuntu.com/7281-1/
reference_id USN-7281-1
reference_type
scores
url https://usn.ubuntu.com/7281-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-12243, GNUTLS-SA-2025-02-07
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5jd-qddc-eudq
25
url VCID-zjx8-ydmt-juf3
vulnerability_id VCID-zjx8-ydmt-juf3
summary gnutls: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10844.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10844
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40036
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40185
published_at 2026-04-02T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.4021
published_at 2026-04-11T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40133
published_at 2026-04-07T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-08T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40198
published_at 2026-04-09T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40172
published_at 2026-04-12T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40154
published_at 2026-04-13T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40203
published_at 2026-04-16T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40173
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10844
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582571
reference_id 1582571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582571
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2018-10844
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjx8-ydmt-juf3
Fixing_vulnerabilities
0
url VCID-334s-gdq8-jucy
vulnerability_id VCID-334s-gdq8-jucy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6251.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6251.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-6251
reference_id
reference_type
scores
0
value 0.06692
scoring_system epss
scoring_elements 0.91194
published_at 2026-04-01T12:55:00Z
1
value 0.06692
scoring_system epss
scoring_elements 0.91198
published_at 2026-04-02T12:55:00Z
2
value 0.06692
scoring_system epss
scoring_elements 0.91207
published_at 2026-04-04T12:55:00Z
3
value 0.06692
scoring_system epss
scoring_elements 0.91214
published_at 2026-04-07T12:55:00Z
4
value 0.06692
scoring_system epss
scoring_elements 0.91228
published_at 2026-04-08T12:55:00Z
5
value 0.06692
scoring_system epss
scoring_elements 0.91234
published_at 2026-04-09T12:55:00Z
6
value 0.06692
scoring_system epss
scoring_elements 0.91241
published_at 2026-04-11T12:55:00Z
7
value 0.06692
scoring_system epss
scoring_elements 0.91245
published_at 2026-04-12T12:55:00Z
8
value 0.06692
scoring_system epss
scoring_elements 0.91244
published_at 2026-04-13T12:55:00Z
9
value 0.06692
scoring_system epss
scoring_elements 0.91268
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-6251
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1251902
reference_id 1251902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1251902
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795068
reference_id 795068
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795068
5
reference_url https://usn.ubuntu.com/2727-1/
reference_id USN-2727-1
reference_type
scores
url https://usn.ubuntu.com/2727-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.8-6%2Bdeb8u7
purl pkg:deb/debian/gnutls28@3.3.8-6%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-334s-gdq8-jucy
1
vulnerability VCID-3qcs-1fcj-m3fw
2
vulnerability VCID-4f3z-x697-abd5
3
vulnerability VCID-5aea-cjz1-jkh1
4
vulnerability VCID-6fzu-8998-abdk
5
vulnerability VCID-6u4f-wt5u-8ueb
6
vulnerability VCID-86j1-j381-cucy
7
vulnerability VCID-92x9-x1ep-cqdn
8
vulnerability VCID-9pdw-udwq-6kbz
9
vulnerability VCID-a18u-4j99-nbf8
10
vulnerability VCID-a296-a2f2-kfba
11
vulnerability VCID-abn3-2b4q-z7ga
12
vulnerability VCID-egeh-jk4m-sba8
13
vulnerability VCID-f5c7-jcd9-67hj
14
vulnerability VCID-gy9e-81rw-pug2
15
vulnerability VCID-jxjc-vjdc-1yfj
16
vulnerability VCID-k31b-6m7s-pffq
17
vulnerability VCID-k5vv-ts4z-j7g5
18
vulnerability VCID-m31f-a3pn-yyb4
19
vulnerability VCID-mtvm-zj2z-m7gf
20
vulnerability VCID-nce1-q8wc-s3ae
21
vulnerability VCID-pf5n-65mk-2ff3
22
vulnerability VCID-q3g5-4xaf-hudf
23
vulnerability VCID-qp8x-339r-pbhe
24
vulnerability VCID-qtsh-kn2d-h7cr
25
vulnerability VCID-qup9-qy11-fqhe
26
vulnerability VCID-r531-qbtt-akgf
27
vulnerability VCID-sp9u-9wwg-b7e9
28
vulnerability VCID-uc8j-r79v-n7ck
29
vulnerability VCID-uws5-j79f-cbar
30
vulnerability VCID-vz27-wyaf-tkcr
31
vulnerability VCID-w7f6-5b6h-8kh4
32
vulnerability VCID-wqyp-93bk-vbh2
33
vulnerability VCID-x5jd-qddc-eudq
34
vulnerability VCID-y71t-sfb1-w3gw
35
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.8-6%252Bdeb8u7
1
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2015-6251
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-334s-gdq8-jucy
1
url VCID-4f3z-x697-abd5
vulnerability_id VCID-4f3z-x697-abd5
summary gnutls: Out-of-bounds write related to the cdk_pkt_read function (GNUTLS-SA-2017-3)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7869.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7869
reference_id
reference_type
scores
0
value 0.00703
scoring_system epss
scoring_elements 0.72024
published_at 2026-04-01T12:55:00Z
1
value 0.00703
scoring_system epss
scoring_elements 0.72116
published_at 2026-04-18T12:55:00Z
2
value 0.00703
scoring_system epss
scoring_elements 0.72099
published_at 2026-04-11T12:55:00Z
3
value 0.00703
scoring_system epss
scoring_elements 0.72082
published_at 2026-04-12T12:55:00Z
4
value 0.00703
scoring_system epss
scoring_elements 0.72066
published_at 2026-04-13T12:55:00Z
5
value 0.00703
scoring_system epss
scoring_elements 0.72108
published_at 2026-04-16T12:55:00Z
6
value 0.00703
scoring_system epss
scoring_elements 0.72031
published_at 2026-04-02T12:55:00Z
7
value 0.00703
scoring_system epss
scoring_elements 0.72051
published_at 2026-04-04T12:55:00Z
8
value 0.00703
scoring_system epss
scoring_elements 0.72027
published_at 2026-04-07T12:55:00Z
9
value 0.00703
scoring_system epss
scoring_elements 0.72064
published_at 2026-04-08T12:55:00Z
10
value 0.00703
scoring_system epss
scoring_elements 0.72076
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7869
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe
6
reference_url https://www.gnutls.org/security.html
reference_id
reference_type
scores
url https://www.gnutls.org/security.html
7
reference_url http://www.securityfocus.com/bid/97040
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97040
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443033
reference_id 1443033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443033
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7869
reference_id CVE-2017-7869
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7869
11
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
12
reference_url https://usn.ubuntu.com/3318-1/
reference_id USN-3318-1
reference_type
scores
url https://usn.ubuntu.com/3318-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2017-7869
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4f3z-x697-abd5
2
url VCID-5aea-cjz1-jkh1
vulnerability_id VCID-5aea-cjz1-jkh1
summary gnutls: Environment variable GNUTLS_KEYLOGFILE is obtained via insecure getenv()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4456.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4456
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47857
published_at 2026-04-01T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.47894
published_at 2026-04-02T12:55:00Z
2
value 0.00246
scoring_system epss
scoring_elements 0.47916
published_at 2026-04-08T12:55:00Z
3
value 0.00246
scoring_system epss
scoring_elements 0.47864
published_at 2026-04-07T12:55:00Z
4
value 0.00246
scoring_system epss
scoring_elements 0.47911
published_at 2026-04-09T12:55:00Z
5
value 0.00246
scoring_system epss
scoring_elements 0.47935
published_at 2026-04-11T12:55:00Z
6
value 0.00246
scoring_system epss
scoring_elements 0.47913
published_at 2026-04-12T12:55:00Z
7
value 0.00246
scoring_system epss
scoring_elements 0.47922
published_at 2026-04-13T12:55:00Z
8
value 0.00246
scoring_system epss
scoring_elements 0.47977
published_at 2026-04-16T12:55:00Z
9
value 0.00246
scoring_system epss
scoring_elements 0.47971
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4456
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:C/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1343505
reference_id 1343505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1343505
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2016-4456
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5aea-cjz1-jkh1
3
url VCID-6u4f-wt5u-8ueb
vulnerability_id VCID-6u4f-wt5u-8ueb
summary gnutls: Incorrect certificate validation when using OCSP responses (GNUTLS-SA-2016-3)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7444.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7444
reference_id
reference_type
scores
0
value 0.01021
scoring_system epss
scoring_elements 0.77173
published_at 2026-04-01T12:55:00Z
1
value 0.01021
scoring_system epss
scoring_elements 0.77273
published_at 2026-04-18T12:55:00Z
2
value 0.01021
scoring_system epss
scoring_elements 0.77258
published_at 2026-04-11T12:55:00Z
3
value 0.01021
scoring_system epss
scoring_elements 0.77237
published_at 2026-04-12T12:55:00Z
4
value 0.01021
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-13T12:55:00Z
5
value 0.01021
scoring_system epss
scoring_elements 0.77179
published_at 2026-04-02T12:55:00Z
6
value 0.01021
scoring_system epss
scoring_elements 0.77208
published_at 2026-04-04T12:55:00Z
7
value 0.01021
scoring_system epss
scoring_elements 0.77189
published_at 2026-04-07T12:55:00Z
8
value 0.01021
scoring_system epss
scoring_elements 0.77221
published_at 2026-04-08T12:55:00Z
9
value 0.01021
scoring_system epss
scoring_elements 0.7723
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7444
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1374266
reference_id 1374266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1374266
5
reference_url https://security.archlinux.org/ASA-201609-25
reference_id ASA-201609-25
reference_type
scores
url https://security.archlinux.org/ASA-201609-25
6
reference_url https://security.archlinux.org/ASA-201609-26
reference_id ASA-201609-26
reference_type
scores
url https://security.archlinux.org/ASA-201609-26
7
reference_url https://security.archlinux.org/AVG-17
reference_id AVG-17
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-17
8
reference_url https://security.archlinux.org/AVG-26
reference_id AVG-26
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-26
9
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
10
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2016-7444
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6u4f-wt5u-8ueb
4
url VCID-egeh-jk4m-sba8
vulnerability_id VCID-egeh-jk4m-sba8
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2017-0574.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0574.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5337.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5337.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5337
reference_id
reference_type
scores
0
value 0.03732
scoring_system epss
scoring_elements 0.87943
published_at 2026-04-01T12:55:00Z
1
value 0.03732
scoring_system epss
scoring_elements 0.88013
published_at 2026-04-18T12:55:00Z
2
value 0.03732
scoring_system epss
scoring_elements 0.88001
published_at 2026-04-12T12:55:00Z
3
value 0.03732
scoring_system epss
scoring_elements 0.88
published_at 2026-04-13T12:55:00Z
4
value 0.03732
scoring_system epss
scoring_elements 0.88014
published_at 2026-04-16T12:55:00Z
5
value 0.03732
scoring_system epss
scoring_elements 0.87953
published_at 2026-04-02T12:55:00Z
6
value 0.03732
scoring_system epss
scoring_elements 0.87967
published_at 2026-04-04T12:55:00Z
7
value 0.03732
scoring_system epss
scoring_elements 0.8797
published_at 2026-04-07T12:55:00Z
8
value 0.03732
scoring_system epss
scoring_elements 0.87991
published_at 2026-04-08T12:55:00Z
9
value 0.03732
scoring_system epss
scoring_elements 0.87997
published_at 2026-04-09T12:55:00Z
10
value 0.03732
scoring_system epss
scoring_elements 0.88008
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5337
4
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338
5
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a
9
reference_url https://gnutls.org/security.html#GNUTLS-SA-2017-2
reference_id
reference_type
scores
url https://gnutls.org/security.html#GNUTLS-SA-2017-2
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/7
11
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/4
12
reference_url http://www.securityfocus.com/bid/95372
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95372
13
reference_url http://www.securitytracker.com/id/1037576
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037576
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411836
reference_id 1411836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411836
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5337
reference_id CVE-2017-5337
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5337
27
reference_url https://security.gentoo.org/glsa/201702-04
reference_id GLSA-201702-04
reference_type
scores
url https://security.gentoo.org/glsa/201702-04
28
reference_url https://access.redhat.com/errata/RHSA-2017:0574
reference_id RHSA-2017:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0574
29
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
30
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2017-5337
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-egeh-jk4m-sba8
5
url VCID-k31b-6m7s-pffq
vulnerability_id VCID-k31b-6m7s-pffq
summary
A null pointer dereference in GnuTLS might allow attackers to cause
    a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7507.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7507
reference_id
reference_type
scores
0
value 0.00518
scoring_system epss
scoring_elements 0.66662
published_at 2026-04-01T12:55:00Z
1
value 0.00518
scoring_system epss
scoring_elements 0.66789
published_at 2026-04-18T12:55:00Z
2
value 0.00518
scoring_system epss
scoring_elements 0.66741
published_at 2026-04-13T12:55:00Z
3
value 0.00518
scoring_system epss
scoring_elements 0.66775
published_at 2026-04-16T12:55:00Z
4
value 0.00518
scoring_system epss
scoring_elements 0.66702
published_at 2026-04-02T12:55:00Z
5
value 0.00518
scoring_system epss
scoring_elements 0.66728
published_at 2026-04-04T12:55:00Z
6
value 0.00518
scoring_system epss
scoring_elements 0.667
published_at 2026-04-07T12:55:00Z
7
value 0.00518
scoring_system epss
scoring_elements 0.66749
published_at 2026-04-08T12:55:00Z
8
value 0.00518
scoring_system epss
scoring_elements 0.66764
published_at 2026-04-09T12:55:00Z
9
value 0.00518
scoring_system epss
scoring_elements 0.66784
published_at 2026-04-11T12:55:00Z
10
value 0.00518
scoring_system epss
scoring_elements 0.6677
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7507
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1454621
reference_id 1454621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1454621
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864560
reference_id 864560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864560
5
reference_url https://security.archlinux.org/ASA-201706-12
reference_id ASA-201706-12
reference_type
scores
url https://security.archlinux.org/ASA-201706-12
6
reference_url https://security.archlinux.org/ASA-201707-6
reference_id ASA-201707-6
reference_type
scores
url https://security.archlinux.org/ASA-201707-6
7
reference_url https://security.archlinux.org/AVG-294
reference_id AVG-294
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-294
8
reference_url https://security.archlinux.org/AVG-295
reference_id AVG-295
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-295
9
reference_url https://security.gentoo.org/glsa/201710-15
reference_id GLSA-201710-15
reference_type
scores
url https://security.gentoo.org/glsa/201710-15
10
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
11
reference_url https://usn.ubuntu.com/3318-1/
reference_id USN-3318-1
reference_type
scores
url https://usn.ubuntu.com/3318-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.8-6%2Bdeb8u7
purl pkg:deb/debian/gnutls28@3.3.8-6%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-334s-gdq8-jucy
1
vulnerability VCID-3qcs-1fcj-m3fw
2
vulnerability VCID-4f3z-x697-abd5
3
vulnerability VCID-5aea-cjz1-jkh1
4
vulnerability VCID-6fzu-8998-abdk
5
vulnerability VCID-6u4f-wt5u-8ueb
6
vulnerability VCID-86j1-j381-cucy
7
vulnerability VCID-92x9-x1ep-cqdn
8
vulnerability VCID-9pdw-udwq-6kbz
9
vulnerability VCID-a18u-4j99-nbf8
10
vulnerability VCID-a296-a2f2-kfba
11
vulnerability VCID-abn3-2b4q-z7ga
12
vulnerability VCID-egeh-jk4m-sba8
13
vulnerability VCID-f5c7-jcd9-67hj
14
vulnerability VCID-gy9e-81rw-pug2
15
vulnerability VCID-jxjc-vjdc-1yfj
16
vulnerability VCID-k31b-6m7s-pffq
17
vulnerability VCID-k5vv-ts4z-j7g5
18
vulnerability VCID-m31f-a3pn-yyb4
19
vulnerability VCID-mtvm-zj2z-m7gf
20
vulnerability VCID-nce1-q8wc-s3ae
21
vulnerability VCID-pf5n-65mk-2ff3
22
vulnerability VCID-q3g5-4xaf-hudf
23
vulnerability VCID-qp8x-339r-pbhe
24
vulnerability VCID-qtsh-kn2d-h7cr
25
vulnerability VCID-qup9-qy11-fqhe
26
vulnerability VCID-r531-qbtt-akgf
27
vulnerability VCID-sp9u-9wwg-b7e9
28
vulnerability VCID-uc8j-r79v-n7ck
29
vulnerability VCID-uws5-j79f-cbar
30
vulnerability VCID-vz27-wyaf-tkcr
31
vulnerability VCID-w7f6-5b6h-8kh4
32
vulnerability VCID-wqyp-93bk-vbh2
33
vulnerability VCID-x5jd-qddc-eudq
34
vulnerability VCID-y71t-sfb1-w3gw
35
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.8-6%252Bdeb8u7
1
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
2
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2017-7507
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k31b-6m7s-pffq
6
url VCID-m31f-a3pn-yyb4
vulnerability_id VCID-m31f-a3pn-yyb4
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2017-0574.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0574.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5335.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5335.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5335
reference_id
reference_type
scores
0
value 0.02671
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-01T12:55:00Z
1
value 0.02671
scoring_system epss
scoring_elements 0.85838
published_at 2026-04-18T12:55:00Z
2
value 0.02671
scoring_system epss
scoring_elements 0.85819
published_at 2026-04-12T12:55:00Z
3
value 0.02671
scoring_system epss
scoring_elements 0.85815
published_at 2026-04-13T12:55:00Z
4
value 0.02671
scoring_system epss
scoring_elements 0.85834
published_at 2026-04-16T12:55:00Z
5
value 0.02671
scoring_system epss
scoring_elements 0.85754
published_at 2026-04-02T12:55:00Z
6
value 0.02671
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-04T12:55:00Z
7
value 0.02671
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-07T12:55:00Z
8
value 0.02671
scoring_system epss
scoring_elements 0.85797
published_at 2026-04-08T12:55:00Z
9
value 0.02671
scoring_system epss
scoring_elements 0.85808
published_at 2026-04-09T12:55:00Z
10
value 0.02671
scoring_system epss
scoring_elements 0.85823
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5335
4
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a
8
reference_url https://gnutls.org/security.html#GNUTLS-SA-2017-2
reference_id
reference_type
scores
url https://gnutls.org/security.html#GNUTLS-SA-2017-2
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/7
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/4
11
reference_url http://www.securityfocus.com/bid/95374
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95374
12
reference_url http://www.securitytracker.com/id/1037576
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037576
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1412235
reference_id 1412235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1412235
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5335
reference_id CVE-2017-5335
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5335
26
reference_url https://security.gentoo.org/glsa/201702-04
reference_id GLSA-201702-04
reference_type
scores
url https://security.gentoo.org/glsa/201702-04
27
reference_url https://access.redhat.com/errata/RHSA-2017:0574
reference_id RHSA-2017:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0574
28
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
29
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2017-5335
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m31f-a3pn-yyb4
7
url VCID-mtvm-zj2z-m7gf
vulnerability_id VCID-mtvm-zj2z-m7gf
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2017-0574.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0574.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5336.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5336.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5336
reference_id
reference_type
scores
0
value 0.03948
scoring_system epss
scoring_elements 0.88295
published_at 2026-04-01T12:55:00Z
1
value 0.03948
scoring_system epss
scoring_elements 0.88359
published_at 2026-04-18T12:55:00Z
2
value 0.03948
scoring_system epss
scoring_elements 0.88358
published_at 2026-04-11T12:55:00Z
3
value 0.03948
scoring_system epss
scoring_elements 0.8835
published_at 2026-04-13T12:55:00Z
4
value 0.03948
scoring_system epss
scoring_elements 0.88363
published_at 2026-04-16T12:55:00Z
5
value 0.03948
scoring_system epss
scoring_elements 0.88303
published_at 2026-04-02T12:55:00Z
6
value 0.03948
scoring_system epss
scoring_elements 0.88317
published_at 2026-04-04T12:55:00Z
7
value 0.03948
scoring_system epss
scoring_elements 0.88322
published_at 2026-04-07T12:55:00Z
8
value 0.03948
scoring_system epss
scoring_elements 0.88341
published_at 2026-04-08T12:55:00Z
9
value 0.03948
scoring_system epss
scoring_elements 0.88347
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5336
4
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
8
reference_url https://gnutls.org/security.html#GNUTLS-SA-2017-2
reference_id
reference_type
scores
url https://gnutls.org/security.html#GNUTLS-SA-2017-2
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/7
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/4
11
reference_url http://www.securityfocus.com/bid/95377
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95377
12
reference_url http://www.securitytracker.com/id/1037576
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037576
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1412236
reference_id 1412236
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1412236
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5336
reference_id CVE-2017-5336
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5336
26
reference_url https://security.gentoo.org/glsa/201702-04
reference_id GLSA-201702-04
reference_type
scores
url https://security.gentoo.org/glsa/201702-04
27
reference_url https://access.redhat.com/errata/RHSA-2017:0574
reference_id RHSA-2017:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0574
28
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
29
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2017-5336
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtvm-zj2z-m7gf
8
url VCID-nce1-q8wc-s3ae
vulnerability_id VCID-nce1-q8wc-s3ae
summary
Multiple vulnerabilities have been fixed in GnuTLS, the worst of
    which can cause Denial of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3308.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3308
reference_id
reference_type
scores
0
value 0.01394
scoring_system epss
scoring_elements 0.8033
published_at 2026-04-01T12:55:00Z
1
value 0.01394
scoring_system epss
scoring_elements 0.80336
published_at 2026-04-02T12:55:00Z
2
value 0.01394
scoring_system epss
scoring_elements 0.80356
published_at 2026-04-04T12:55:00Z
3
value 0.01394
scoring_system epss
scoring_elements 0.80345
published_at 2026-04-07T12:55:00Z
4
value 0.01394
scoring_system epss
scoring_elements 0.80374
published_at 2026-04-08T12:55:00Z
5
value 0.01394
scoring_system epss
scoring_elements 0.80385
published_at 2026-04-09T12:55:00Z
6
value 0.01394
scoring_system epss
scoring_elements 0.80403
published_at 2026-04-11T12:55:00Z
7
value 0.01394
scoring_system epss
scoring_elements 0.80388
published_at 2026-04-12T12:55:00Z
8
value 0.01394
scoring_system epss
scoring_elements 0.80381
published_at 2026-04-13T12:55:00Z
9
value 0.01394
scoring_system epss
scoring_elements 0.8041
published_at 2026-04-16T12:55:00Z
10
value 0.01394
scoring_system epss
scoring_elements 0.80411
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212459
reference_id 1212459
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212459
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782776
reference_id 782776
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782776
5
reference_url https://security.gentoo.org/glsa/201506-03
reference_id GLSA-201506-03
reference_type
scores
url https://security.gentoo.org/glsa/201506-03
6
reference_url https://usn.ubuntu.com/2727-1/
reference_id USN-2727-1
reference_type
scores
url https://usn.ubuntu.com/2727-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2015-3308
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nce1-q8wc-s3ae
9
url VCID-qup9-qy11-fqhe
vulnerability_id VCID-qup9-qy11-fqhe
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
14
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
reference_id
reference_type
scores
0
value 0.01509
scoring_system epss
scoring_elements 0.81228
published_at 2026-04-18T12:55:00Z
1
value 0.01509
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-01T12:55:00Z
2
value 0.01509
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-11T12:55:00Z
3
value 0.01509
scoring_system epss
scoring_elements 0.81196
published_at 2026-04-12T12:55:00Z
4
value 0.01509
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-13T12:55:00Z
5
value 0.01509
scoring_system epss
scoring_elements 0.81226
published_at 2026-04-16T12:55:00Z
6
value 0.01509
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-02T12:55:00Z
7
value 0.01509
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-07T12:55:00Z
8
value 0.01509
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-08T12:55:00Z
9
value 0.01509
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
24
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
55
reference_url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
56
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
57
reference_url https://security.netapp.com/advisory/ntap-20160225-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160225-0001/
58
reference_url http://www.debian.org/security/2016/dsa-3436
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3436
59
reference_url http://www.debian.org/security/2016/dsa-3437
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3437
60
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
61
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
62
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
63
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
64
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
65
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
66
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
67
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
68
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
71
reference_url http://www.securityfocus.com/bid/79684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79684
72
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
73
reference_url http://www.securitytracker.com/id/1034541
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034541
74
reference_url http://www.securitytracker.com/id/1036467
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036467
75
reference_url http://www.ubuntu.com/usn/USN-2863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2863-1
76
reference_url http://www.ubuntu.com/usn/USN-2864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2864-1
77
reference_url http://www.ubuntu.com/usn/USN-2865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2865-1
78
reference_url http://www.ubuntu.com/usn/USN-2866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2866-1
79
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
80
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
reference_id 1289841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
reference_id CVE-2015-7575
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
102
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
103
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
104
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
105
reference_url https://security.gentoo.org/glsa/201801-15
reference_id GLSA-201801-15
reference_type
scores
url https://security.gentoo.org/glsa/201801-15
106
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
reference_id mfsa2015-150
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
107
reference_url https://access.redhat.com/errata/RHSA-2016:0007
reference_id RHSA-2016:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0007
108
reference_url https://access.redhat.com/errata/RHSA-2016:0008
reference_id RHSA-2016:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0008
109
reference_url https://access.redhat.com/errata/RHSA-2016:0012
reference_id RHSA-2016:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0012
110
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
111
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
112
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
113
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
114
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
115
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
116
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
117
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
118
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
119
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
120
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
121
reference_url https://usn.ubuntu.com/2863-1/
reference_id USN-2863-1
reference_type
scores
url https://usn.ubuntu.com/2863-1/
122
reference_url https://usn.ubuntu.com/2864-1/
reference_id USN-2864-1
reference_type
scores
url https://usn.ubuntu.com/2864-1/
123
reference_url https://usn.ubuntu.com/2865-1/
reference_id USN-2865-1
reference_type
scores
url https://usn.ubuntu.com/2865-1/
124
reference_url https://usn.ubuntu.com/2866-1/
reference_id USN-2866-1
reference_type
scores
url https://usn.ubuntu.com/2866-1/
125
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
126
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2015-7575
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe
10
url VCID-y71t-sfb1-w3gw
vulnerability_id VCID-y71t-sfb1-w3gw
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5334.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5334.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5334
reference_id
reference_type
scores
0
value 0.05592
scoring_system epss
scoring_elements 0.90264
published_at 2026-04-01T12:55:00Z
1
value 0.05592
scoring_system epss
scoring_elements 0.90324
published_at 2026-04-18T12:55:00Z
2
value 0.05592
scoring_system epss
scoring_elements 0.90315
published_at 2026-04-11T12:55:00Z
3
value 0.05592
scoring_system epss
scoring_elements 0.90314
published_at 2026-04-12T12:55:00Z
4
value 0.05592
scoring_system epss
scoring_elements 0.90308
published_at 2026-04-13T12:55:00Z
5
value 0.05592
scoring_system epss
scoring_elements 0.90267
published_at 2026-04-02T12:55:00Z
6
value 0.05592
scoring_system epss
scoring_elements 0.9028
published_at 2026-04-04T12:55:00Z
7
value 0.05592
scoring_system epss
scoring_elements 0.90285
published_at 2026-04-07T12:55:00Z
8
value 0.05592
scoring_system epss
scoring_elements 0.903
published_at 2026-04-08T12:55:00Z
9
value 0.05592
scoring_system epss
scoring_elements 0.90307
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5334
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b
6
reference_url https://gnutls.org/security.html#GNUTLS-SA-2017-1
reference_id
reference_type
scores
url https://gnutls.org/security.html#GNUTLS-SA-2017-1
7
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/7
8
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/4
9
reference_url http://www.securityfocus.com/bid/95370
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95370
10
reference_url http://www.securitytracker.com/id/1037576
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037576
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411835
reference_id 1411835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411835
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5334
reference_id CVE-2017-5334
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5334
24
reference_url https://security.gentoo.org/glsa/201702-04
reference_id GLSA-201702-04
reference_type
scores
url https://security.gentoo.org/glsa/201702-04
25
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
26
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
aliases CVE-2017-5334
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y71t-sfb1-w3gw
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5