Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
Typedeb
Namespacedebian
Namegnutls28
Version3.6.7-4+deb10u8
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.7.9-2+deb12u5
Latest_non_vulnerable_version3.7.9-2+deb12u5
Affected_by_vulnerabilities
0
url VCID-3qcs-1fcj-m3fw
vulnerability_id VCID-3qcs-1fcj-m3fw
summary gnutls: DTLS client hello contains a random value of all zeroes
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
reference_id
reference_type
scores
0
value 0.11487
scoring_system epss
scoring_elements 0.93575
published_at 2026-04-01T12:55:00Z
1
value 0.11487
scoring_system epss
scoring_elements 0.93642
published_at 2026-04-21T12:55:00Z
2
value 0.11487
scoring_system epss
scoring_elements 0.93611
published_at 2026-04-13T12:55:00Z
3
value 0.11487
scoring_system epss
scoring_elements 0.93631
published_at 2026-04-16T12:55:00Z
4
value 0.11487
scoring_system epss
scoring_elements 0.93637
published_at 2026-04-18T12:55:00Z
5
value 0.11487
scoring_system epss
scoring_elements 0.93584
published_at 2026-04-02T12:55:00Z
6
value 0.11487
scoring_system epss
scoring_elements 0.93592
published_at 2026-04-04T12:55:00Z
7
value 0.11487
scoring_system epss
scoring_elements 0.93593
published_at 2026-04-07T12:55:00Z
8
value 0.11487
scoring_system epss
scoring_elements 0.93602
published_at 2026-04-08T12:55:00Z
9
value 0.11487
scoring_system epss
scoring_elements 0.93605
published_at 2026-04-09T12:55:00Z
10
value 0.11487
scoring_system epss
scoring_elements 0.9361
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/960
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/issues/960
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
9
reference_url https://security.gentoo.org/glsa/202004-06
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/202004-06
10
reference_url https://security.netapp.com/advisory/ntap-20200416-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0002/
11
reference_url https://www.debian.org/security/2020/dsa-4652
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4652
12
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
reference_id
reference_type
scores
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
reference_id 1821896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
reference_id 955556
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
reference_id CVE-2020-11501
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
22
reference_url https://access.redhat.com/errata/RHSA-2020:1998
reference_id RHSA-2020:1998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1998
23
reference_url https://usn.ubuntu.com/4322-1/
reference_id USN-4322-1
reference_type
scores
url https://usn.ubuntu.com/4322-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-11501, GNUTLS-SA-2020-03-31
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qcs-1fcj-m3fw
1
url VCID-6fzu-8998-abdk
vulnerability_id VCID-6fzu-8998-abdk
summary
An information disclosure vulnerability in GnuTLS allow remote
    attackers to obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75032
published_at 2026-04-01T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.75074
published_at 2026-04-08T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75034
published_at 2026-04-02T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.75064
published_at 2026-04-04T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-07T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-09T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.75108
published_at 2026-04-11T12:55:00Z
7
value 0.01521
scoring_system epss
scoring_elements 0.81292
published_at 2026-04-16T12:55:00Z
8
value 0.01521
scoring_system epss
scoring_elements 0.81293
published_at 2026-04-21T12:55:00Z
9
value 0.01521
scoring_system epss
scoring_elements 0.81263
published_at 2026-04-12T12:55:00Z
10
value 0.01521
scoring_system epss
scoring_elements 0.81255
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
reference_id 1843723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
reference_id 962289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
6
reference_url https://security.archlinux.org/ASA-202006-2
reference_id ASA-202006-2
reference_type
scores
url https://security.archlinux.org/ASA-202006-2
7
reference_url https://security.archlinux.org/AVG-1177
reference_id AVG-1177
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1177
8
reference_url https://security.gentoo.org/glsa/202006-01
reference_id GLSA-202006-01
reference_type
scores
url https://security.gentoo.org/glsa/202006-01
9
reference_url https://access.redhat.com/errata/RHSA-2020:2637
reference_id RHSA-2020:2637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2637
10
reference_url https://access.redhat.com/errata/RHSA-2020:2638
reference_id RHSA-2020:2638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2638
11
reference_url https://access.redhat.com/errata/RHSA-2020:2639
reference_id RHSA-2020:2639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2639
12
reference_url https://usn.ubuntu.com/4384-1/
reference_id USN-4384-1
reference_type
scores
url https://usn.ubuntu.com/4384-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-13777, GNUTLS-SA-2020-06-03
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fzu-8998-abdk
2
url VCID-86j1-j381-cucy
vulnerability_id VCID-86j1-j381-cucy
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2509.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2509
reference_id
reference_type
scores
0
value 0.00628
scoring_system epss
scoring_elements 0.70277
published_at 2026-04-21T12:55:00Z
1
value 0.00628
scoring_system epss
scoring_elements 0.70257
published_at 2026-04-12T12:55:00Z
2
value 0.00628
scoring_system epss
scoring_elements 0.70245
published_at 2026-04-13T12:55:00Z
3
value 0.00628
scoring_system epss
scoring_elements 0.70286
published_at 2026-04-16T12:55:00Z
4
value 0.00628
scoring_system epss
scoring_elements 0.70295
published_at 2026-04-18T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75712
published_at 2026-04-02T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75743
published_at 2026-04-04T12:55:00Z
7
value 0.00908
scoring_system epss
scoring_elements 0.75722
published_at 2026-04-07T12:55:00Z
8
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
9
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-09T12:55:00Z
10
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
reference_id 004746.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108977
reference_id 2108977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108977
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
reference_id 6FL27JS3VM74YEQU7PGB62USO3KSBYZX
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
7
reference_url https://access.redhat.com/security/cve/CVE-2022-2509
reference_id CVE-2022-2509
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://access.redhat.com/security/cve/CVE-2022-2509
8
reference_url https://www.debian.org/security/2022/dsa-5203
reference_id dsa-5203
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://www.debian.org/security/2022/dsa-5203
9
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
10
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
11
reference_url https://access.redhat.com/errata/RHSA-2022:6854
reference_id RHSA-2022:6854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6854
12
reference_url https://access.redhat.com/errata/RHSA-2022:7105
reference_id RHSA-2022:7105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7105
13
reference_url https://usn.ubuntu.com/5550-1/
reference_id USN-5550-1
reference_type
scores
url https://usn.ubuntu.com/5550-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2022-2509, GNUTLS-SA-2022-07-07
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86j1-j381-cucy
3
url VCID-92x9-x1ep-cqdn
vulnerability_id VCID-92x9-x1ep-cqdn
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28834.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28834
reference_id
reference_type
scores
0
value 0.01705
scoring_system epss
scoring_elements 0.8227
published_at 2026-04-04T12:55:00Z
1
value 0.01705
scoring_system epss
scoring_elements 0.82292
published_at 2026-04-08T12:55:00Z
2
value 0.01705
scoring_system epss
scoring_elements 0.82265
published_at 2026-04-07T12:55:00Z
3
value 0.01705
scoring_system epss
scoring_elements 0.82251
published_at 2026-04-02T12:55:00Z
4
value 0.02294
scoring_system epss
scoring_elements 0.84742
published_at 2026-04-21T12:55:00Z
5
value 0.02294
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-09T12:55:00Z
6
value 0.02294
scoring_system epss
scoring_elements 0.84729
published_at 2026-04-11T12:55:00Z
7
value 0.02294
scoring_system epss
scoring_elements 0.84724
published_at 2026-04-12T12:55:00Z
8
value 0.02294
scoring_system epss
scoring_elements 0.84718
published_at 2026-04-13T12:55:00Z
9
value 0.02294
scoring_system epss
scoring_elements 0.84739
published_at 2026-04-16T12:55:00Z
10
value 0.02294
scoring_system epss
scoring_elements 0.84741
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
reference_id 004845.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067464
reference_id 1067464
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067464
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269228
reference_id 2269228
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269228
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2024-28834
reference_id CVE-2024-28834
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/security/cve/CVE-2024-28834
21
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
22
reference_url https://access.redhat.com/errata/RHSA-2024:1784
reference_id RHSA-2024:1784
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1784
23
reference_url https://access.redhat.com/errata/RHSA-2024:1879
reference_id RHSA-2024:1879
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1879
24
reference_url https://access.redhat.com/errata/RHSA-2024:1997
reference_id RHSA-2024:1997
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1997
25
reference_url https://access.redhat.com/errata/RHSA-2024:2044
reference_id RHSA-2024:2044
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2044
26
reference_url https://access.redhat.com/errata/RHSA-2024:2570
reference_id RHSA-2024:2570
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2570
27
reference_url https://access.redhat.com/errata/RHSA-2024:2889
reference_id RHSA-2024:2889
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2889
28
reference_url https://usn.ubuntu.com/6733-1/
reference_id USN-6733-1
reference_type
scores
url https://usn.ubuntu.com/6733-1/
29
reference_url https://usn.ubuntu.com/6733-2/
reference_id USN-6733-2
reference_type
scores
url https://usn.ubuntu.com/6733-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-28834, GNUTLS-SA-2023-12-04
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92x9-x1ep-cqdn
4
url VCID-9pdw-udwq-6kbz
vulnerability_id VCID-9pdw-udwq-6kbz
summary gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9820.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9820
reference_id
reference_type
scores
0
value 0.00011
scoring_system epss
scoring_elements 0.01302
published_at 2026-04-18T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02569
published_at 2026-04-02T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02855
published_at 2026-04-13T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.0286
published_at 2026-04-12T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02875
published_at 2026-04-04T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02883
published_at 2026-04-07T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02884
published_at 2026-04-08T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.02907
published_at 2026-04-09T12:55:00Z
8
value 0.00015
scoring_system epss
scoring_elements 0.02879
published_at 2026-04-11T12:55:00Z
9
value 0.00015
scoring_system epss
scoring_elements 0.02838
published_at 2026-04-16T12:55:00Z
10
value 9e-05
scoring_system epss
scoring_elements 0.00919
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121146
reference_id 1121146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121146
5
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1732
reference_id 1732
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1732
6
reference_url https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
reference_id 1d56f96f6ab5034d677136b9d50b5a75dff0faf5
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392528
reference_id 2392528
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2392528
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://access.redhat.com/security/cve/CVE-2025-9820
reference_id CVE-2025-9820
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/security/cve/CVE-2025-9820
22
reference_url https://access.redhat.com/errata/RHSA-2026:3477
reference_id RHSA-2026:3477
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:3477
23
reference_url https://access.redhat.com/errata/RHSA-2026:4188
reference_id RHSA-2026:4188
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4188
24
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4655
25
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4943
26
reference_url https://access.redhat.com/errata/RHSA-2026:5585
reference_id RHSA-2026:5585
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:5585
27
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:5606
28
reference_url https://access.redhat.com/errata/RHSA-2026:7329
reference_id RHSA-2026:7329
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:7329
29
reference_url https://access.redhat.com/errata/RHSA-2026:7477
reference_id RHSA-2026:7477
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:7477
30
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
reference_id security-new.html#GNUTLS-SA-2025-11-18
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
31
reference_url https://usn.ubuntu.com/8043-1/
reference_id USN-8043-1
reference_type
scores
url https://usn.ubuntu.com/8043-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-9820, GNUTLS-SA-2025-11-18
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pdw-udwq-6kbz
5
url VCID-a18u-4j99-nbf8
vulnerability_id VCID-a18u-4j99-nbf8
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0553.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0553
reference_id
reference_type
scores
0
value 0.00948
scoring_system epss
scoring_elements 0.76371
published_at 2026-04-21T12:55:00Z
1
value 0.01029
scoring_system epss
scoring_elements 0.77302
published_at 2026-04-09T12:55:00Z
2
value 0.01029
scoring_system epss
scoring_elements 0.77345
published_at 2026-04-18T12:55:00Z
3
value 0.01029
scoring_system epss
scoring_elements 0.77346
published_at 2026-04-16T12:55:00Z
4
value 0.01029
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-13T12:55:00Z
5
value 0.01029
scoring_system epss
scoring_elements 0.77309
published_at 2026-04-12T12:55:00Z
6
value 0.01029
scoring_system epss
scoring_elements 0.7733
published_at 2026-04-11T12:55:00Z
7
value 0.01029
scoring_system epss
scoring_elements 0.77252
published_at 2026-04-02T12:55:00Z
8
value 0.01029
scoring_system epss
scoring_elements 0.7728
published_at 2026-04-04T12:55:00Z
9
value 0.01029
scoring_system epss
scoring_elements 0.77262
published_at 2026-04-07T12:55:00Z
10
value 0.01029
scoring_system epss
scoring_elements 0.77294
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
reference_id 004841.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061046
reference_id 1061046
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061046
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1522
reference_id 1522
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1522
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258412
reference_id 2258412
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258412
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_id cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0553
reference_id CVE-2024-0553
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/security/cve/CVE-2024-0553
23
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
24
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0533
25
reference_url https://access.redhat.com/errata/RHSA-2024:0627
reference_id RHSA-2024:0627
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0627
26
reference_url https://access.redhat.com/errata/RHSA-2024:0796
reference_id RHSA-2024:0796
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0796
27
reference_url https://access.redhat.com/errata/RHSA-2024:1082
reference_id RHSA-2024:1082
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1082
28
reference_url https://access.redhat.com/errata/RHSA-2024:1108
reference_id RHSA-2024:1108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1108
29
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1383
30
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:2094
31
reference_url https://usn.ubuntu.com/6593-1/
reference_id USN-6593-1
reference_type
scores
url https://usn.ubuntu.com/6593-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2024-0553
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a18u-4j99-nbf8
6
url VCID-abn3-2b4q-z7ga
vulnerability_id VCID-abn3-2b4q-z7ga
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5981.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5981.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5981
reference_id
reference_type
scores
0
value 0.00844
scoring_system epss
scoring_elements 0.74798
published_at 2026-04-21T12:55:00Z
1
value 0.00916
scoring_system epss
scoring_elements 0.75849
published_at 2026-04-02T12:55:00Z
2
value 0.00916
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-04T12:55:00Z
3
value 0.00916
scoring_system epss
scoring_elements 0.75861
published_at 2026-04-07T12:55:00Z
4
value 0.00916
scoring_system epss
scoring_elements 0.75893
published_at 2026-04-08T12:55:00Z
5
value 0.00916
scoring_system epss
scoring_elements 0.75906
published_at 2026-04-09T12:55:00Z
6
value 0.00916
scoring_system epss
scoring_elements 0.75929
published_at 2026-04-11T12:55:00Z
7
value 0.00916
scoring_system epss
scoring_elements 0.75911
published_at 2026-04-12T12:55:00Z
8
value 0.00916
scoring_system epss
scoring_elements 0.75904
published_at 2026-04-13T12:55:00Z
9
value 0.00916
scoring_system epss
scoring_elements 0.75942
published_at 2026-04-16T12:55:00Z
10
value 0.00916
scoring_system epss
scoring_elements 0.75944
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5981
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056188
reference_id 1056188
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056188
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2248445
reference_id 2248445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2248445
6
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
7
reference_url https://access.redhat.com/errata/RHSA-2024:0155
reference_id RHSA-2024:0155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0155
8
reference_url https://access.redhat.com/errata/RHSA-2024:0319
reference_id RHSA-2024:0319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0319
9
reference_url https://access.redhat.com/errata/RHSA-2024:0399
reference_id RHSA-2024:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0399
10
reference_url https://access.redhat.com/errata/RHSA-2024:0451
reference_id RHSA-2024:0451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0451
11
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0533
12
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
13
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
14
reference_url https://usn.ubuntu.com/6499-1/
reference_id USN-6499-1
reference_type
scores
url https://usn.ubuntu.com/6499-1/
15
reference_url https://usn.ubuntu.com/6499-2/
reference_id USN-6499-2
reference_type
scores
url https://usn.ubuntu.com/6499-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2023-5981
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-abn3-2b4q-z7ga
7
url VCID-f5c7-jcd9-67hj
vulnerability_id VCID-f5c7-jcd9-67hj
summary gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14831.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14831
reference_id
reference_type
scores
0
value 0.00059
scoring_system epss
scoring_elements 0.18321
published_at 2026-04-21T12:55:00Z
1
value 0.00059
scoring_system epss
scoring_elements 0.18296
published_at 2026-04-18T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19773
published_at 2026-04-07T12:55:00Z
3
value 0.00064
scoring_system epss
scoring_elements 0.19907
published_at 2026-04-09T12:55:00Z
4
value 0.00064
scoring_system epss
scoring_elements 0.19853
published_at 2026-04-08T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20169
published_at 2026-04-16T12:55:00Z
6
value 0.00065
scoring_system epss
scoring_elements 0.20176
published_at 2026-04-13T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.2028
published_at 2026-04-11T12:55:00Z
8
value 0.00065
scoring_system epss
scoring_elements 0.20235
published_at 2026-04-12T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20961
published_at 2026-04-02T12:55:00Z
10
value 0.00067
scoring_system epss
scoring_elements 0.2102
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1773
reference_id 1773
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1773
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423177
reference_id 2423177
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2423177
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9
reference_id cpe:/a:redhat:ai_inference_server:3.2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.3::el9
reference_id cpe:/a:redhat:ai_inference_server:3.3::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.3::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
reference_id cpe:/o:redhat:rhel_eus:9.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
28
reference_url https://access.redhat.com/security/cve/CVE-2025-14831
reference_id CVE-2025-14831
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/security/cve/CVE-2025-14831
29
reference_url https://access.redhat.com/errata/RHSA-2026:3477
reference_id RHSA-2026:3477
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:3477
30
reference_url https://access.redhat.com/errata/RHSA-2026:4188
reference_id RHSA-2026:4188
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4188
31
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4655
32
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4943
33
reference_url https://access.redhat.com/errata/RHSA-2026:5585
reference_id RHSA-2026:5585
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:5585
34
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:5606
35
reference_url https://access.redhat.com/errata/RHSA-2026:6618
reference_id RHSA-2026:6618
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6618
36
reference_url https://access.redhat.com/errata/RHSA-2026:6630
reference_id RHSA-2026:6630
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6630
37
reference_url https://access.redhat.com/errata/RHSA-2026:6737
reference_id RHSA-2026:6737
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6737
38
reference_url https://access.redhat.com/errata/RHSA-2026:6738
reference_id RHSA-2026:6738
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6738
39
reference_url https://access.redhat.com/errata/RHSA-2026:7329
reference_id RHSA-2026:7329
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:7329
40
reference_url https://access.redhat.com/errata/RHSA-2026:7335
reference_id RHSA-2026:7335
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:7335
41
reference_url https://access.redhat.com/errata/RHSA-2026:8746
reference_id RHSA-2026:8746
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:8746
42
reference_url https://access.redhat.com/errata/RHSA-2026:8747
reference_id RHSA-2026:8747
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:8747
43
reference_url https://access.redhat.com/errata/RHSA-2026:8748
reference_id RHSA-2026:8748
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:8748
44
reference_url https://usn.ubuntu.com/8043-1/
reference_id USN-8043-1
reference_type
scores
url https://usn.ubuntu.com/8043-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-14831, GNUTLS-SA-2026-02-09-2
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f5c7-jcd9-67hj
8
url VCID-gy9e-81rw-pug2
vulnerability_id VCID-gy9e-81rw-pug2
summary GnuTLS: Null pointer dereference in MD_UPDATE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4209.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4209
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56804
published_at 2026-04-01T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56898
published_at 2026-04-02T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56919
published_at 2026-04-04T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.56895
published_at 2026-04-07T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56947
published_at 2026-04-08T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.5695
published_at 2026-04-09T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56958
published_at 2026-04-11T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56938
published_at 2026-04-12T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56915
published_at 2026-04-13T12:55:00Z
9
value 0.00342
scoring_system epss
scoring_elements 0.56944
published_at 2026-04-16T12:55:00Z
10
value 0.00342
scoring_system epss
scoring_elements 0.56941
published_at 2026-04-18T12:55:00Z
11
value 0.00342
scoring_system epss
scoring_elements 0.56918
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044156
reference_id 2044156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044156
5
reference_url https://usn.ubuntu.com/5550-1/
reference_id USN-5550-1
reference_type
scores
url https://usn.ubuntu.com/5550-1/
6
reference_url https://usn.ubuntu.com/5750-1/
reference_id USN-5750-1
reference_type
scores
url https://usn.ubuntu.com/5750-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-4209
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gy9e-81rw-pug2
9
url VCID-jxjc-vjdc-1yfj
vulnerability_id VCID-jxjc-vjdc-1yfj
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0361.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0361
reference_id
reference_type
scores
0
value 0.03615
scoring_system epss
scoring_elements 0.87746
published_at 2026-04-02T12:55:00Z
1
value 0.03615
scoring_system epss
scoring_elements 0.87759
published_at 2026-04-04T12:55:00Z
2
value 0.03615
scoring_system epss
scoring_elements 0.87762
published_at 2026-04-07T12:55:00Z
3
value 0.03615
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-08T12:55:00Z
4
value 0.03615
scoring_system epss
scoring_elements 0.8779
published_at 2026-04-09T12:55:00Z
5
value 0.03615
scoring_system epss
scoring_elements 0.87801
published_at 2026-04-11T12:55:00Z
6
value 0.03615
scoring_system epss
scoring_elements 0.87795
published_at 2026-04-12T12:55:00Z
7
value 0.03615
scoring_system epss
scoring_elements 0.87794
published_at 2026-04-13T12:55:00Z
8
value 0.03615
scoring_system epss
scoring_elements 0.87808
published_at 2026-04-16T12:55:00Z
9
value 0.03615
scoring_system epss
scoring_elements 0.87807
published_at 2026-04-18T12:55:00Z
10
value 0.03615
scoring_system epss
scoring_elements 0.87805
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162596
reference_id 2162596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162596
5
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
6
reference_url https://access.redhat.com/errata/RHSA-2023:1141
reference_id RHSA-2023:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1141
7
reference_url https://access.redhat.com/errata/RHSA-2023:1200
reference_id RHSA-2023:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1200
8
reference_url https://access.redhat.com/errata/RHSA-2023:1569
reference_id RHSA-2023:1569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1569
9
reference_url https://access.redhat.com/errata/RHSA-2023:3361
reference_id RHSA-2023:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3361
10
reference_url https://usn.ubuntu.com/5901-1/
reference_id USN-5901-1
reference_type
scores
url https://usn.ubuntu.com/5901-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2023-0361
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxjc-vjdc-1yfj
10
url VCID-k5vv-ts4z-j7g5
vulnerability_id VCID-k5vv-ts4z-j7g5
summary gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
reference_id
reference_type
scores
0
value 0.00844
scoring_system epss
scoring_elements 0.74724
published_at 2026-04-01T12:55:00Z
1
value 0.00844
scoring_system epss
scoring_elements 0.74802
published_at 2026-04-21T12:55:00Z
2
value 0.00844
scoring_system epss
scoring_elements 0.74727
published_at 2026-04-02T12:55:00Z
3
value 0.00844
scoring_system epss
scoring_elements 0.74754
published_at 2026-04-04T12:55:00Z
4
value 0.00844
scoring_system epss
scoring_elements 0.74728
published_at 2026-04-07T12:55:00Z
5
value 0.00844
scoring_system epss
scoring_elements 0.7476
published_at 2026-04-08T12:55:00Z
6
value 0.00844
scoring_system epss
scoring_elements 0.74775
published_at 2026-04-09T12:55:00Z
7
value 0.00844
scoring_system epss
scoring_elements 0.74799
published_at 2026-04-11T12:55:00Z
8
value 0.00844
scoring_system epss
scoring_elements 0.74778
published_at 2026-04-12T12:55:00Z
9
value 0.00844
scoring_system epss
scoring_elements 0.74768
published_at 2026-04-13T12:55:00Z
10
value 0.00844
scoring_system epss
scoring_elements 0.74803
published_at 2026-04-16T12:55:00Z
11
value 0.00844
scoring_system epss
scoring_elements 0.74811
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
reference_id 1922275
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://security.netapp.com/advisory/ntap-20210416-0005/
reference_id ntap-20210416-0005
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://security.netapp.com/advisory/ntap-20210416-0005/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
reference_id OSLAE6PP33A7VYRYMYMUVB3U6B26GZER
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
9
reference_url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_id r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_id r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_id r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_id r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_id r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_id rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_id rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_id rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
17
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
18
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
reference_id security-new.html#GNUTLS-SA-2021-03-10
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
19
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-20232
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5vv-ts4z-j7g5
11
url VCID-pf5n-65mk-2ff3
vulnerability_id VCID-pf5n-65mk-2ff3
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32990.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32990.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32990
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.2197
published_at 2026-04-02T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22023
published_at 2026-04-04T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-16T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22037
published_at 2026-04-18T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.2235
published_at 2026-04-21T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23628
published_at 2026-04-09T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23645
published_at 2026-04-11T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23603
published_at 2026-04-12T12:55:00Z
8
value 0.0008
scoring_system epss
scoring_elements 0.23546
published_at 2026-04-13T12:55:00Z
9
value 0.0008
scoring_system epss
scoring_elements 0.23583
published_at 2026-04-08T12:55:00Z
10
value 0.0008
scoring_system epss
scoring_elements 0.23512
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32990
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
reference_id 004883.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359620
reference_id 2359620
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359620
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
22
reference_url https://access.redhat.com/security/cve/CVE-2025-32990
reference_id CVE-2025-32990
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/security/cve/CVE-2025-32990
23
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
24
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:16115
25
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:16116
26
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17181
27
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17348
28
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17361
29
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17415
30
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:19088
31
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:22529
32
reference_url https://access.redhat.com/errata/RHSA-2026:7477
reference_id RHSA-2026:7477
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2026:7477
33
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
34
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-32990, GNUTLS-SA-2025-07-08-3
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf5n-65mk-2ff3
12
url VCID-qtsh-kn2d-h7cr
vulnerability_id VCID-qtsh-kn2d-h7cr
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28835.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28835
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10776
published_at 2026-04-08T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.107
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1081
published_at 2026-04-02T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13196
published_at 2026-04-21T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13317
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13284
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13246
published_at 2026-04-12T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.13197
published_at 2026-04-13T12:55:00Z
9
value 0.00043
scoring_system epss
scoring_elements 0.13102
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
reference_id 004845.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067463
reference_id 1067463
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067463
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269084
reference_id 2269084
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269084
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
15
reference_url https://access.redhat.com/security/cve/CVE-2024-28835
reference_id CVE-2024-28835
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/security/cve/CVE-2024-28835
16
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
17
reference_url https://access.redhat.com/errata/RHSA-2024:1879
reference_id RHSA-2024:1879
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:1879
18
reference_url https://access.redhat.com/errata/RHSA-2024:2570
reference_id RHSA-2024:2570
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:2570
19
reference_url https://access.redhat.com/errata/RHSA-2024:2889
reference_id RHSA-2024:2889
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:2889
20
reference_url https://usn.ubuntu.com/6733-1/
reference_id USN-6733-1
reference_type
scores
url https://usn.ubuntu.com/6733-1/
21
reference_url https://usn.ubuntu.com/6733-2/
reference_id USN-6733-2
reference_type
scores
url https://usn.ubuntu.com/6733-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-28835, GNUTLS-SA-2024-01-23
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtsh-kn2d-h7cr
13
url VCID-sp9u-9wwg-b7e9
vulnerability_id VCID-sp9u-9wwg-b7e9
summary
A flaw was found in GnuTLS, possibly allowing a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24659.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24659
reference_id
reference_type
scores
0
value 0.03633
scoring_system epss
scoring_elements 0.87779
published_at 2026-04-01T12:55:00Z
1
value 0.03633
scoring_system epss
scoring_elements 0.87789
published_at 2026-04-02T12:55:00Z
2
value 0.03633
scoring_system epss
scoring_elements 0.878
published_at 2026-04-04T12:55:00Z
3
value 0.03633
scoring_system epss
scoring_elements 0.87804
published_at 2026-04-07T12:55:00Z
4
value 0.03633
scoring_system epss
scoring_elements 0.87826
published_at 2026-04-08T12:55:00Z
5
value 0.03633
scoring_system epss
scoring_elements 0.87832
published_at 2026-04-09T12:55:00Z
6
value 0.03633
scoring_system epss
scoring_elements 0.87844
published_at 2026-04-11T12:55:00Z
7
value 0.03633
scoring_system epss
scoring_elements 0.87838
published_at 2026-04-12T12:55:00Z
8
value 0.03633
scoring_system epss
scoring_elements 0.87837
published_at 2026-04-13T12:55:00Z
9
value 0.03633
scoring_system epss
scoring_elements 0.87851
published_at 2026-04-16T12:55:00Z
10
value 0.03633
scoring_system epss
scoring_elements 0.87849
published_at 2026-04-18T12:55:00Z
11
value 0.03633
scoring_system epss
scoring_elements 0.87846
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872021
reference_id 1872021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872021
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969547
reference_id 969547
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969547
6
reference_url https://security.gentoo.org/glsa/202009-01
reference_id GLSA-202009-01
reference_type
scores
url https://security.gentoo.org/glsa/202009-01
7
reference_url https://access.redhat.com/errata/RHSA-2020:5483
reference_id RHSA-2020:5483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5483
8
reference_url https://usn.ubuntu.com/4491-1/
reference_id USN-4491-1
reference_type
scores
url https://usn.ubuntu.com/4491-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-24659, GNUTLS-SA-2020-09-04
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sp9u-9wwg-b7e9
14
url VCID-uc8j-r79v-n7ck
vulnerability_id VCID-uc8j-r79v-n7ck
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32988.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32988
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16875
published_at 2026-04-02T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16932
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.1899
published_at 2026-04-16T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19034
published_at 2026-04-13T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19002
published_at 2026-04-18T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.18994
published_at 2026-04-07T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19074
published_at 2026-04-08T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19127
published_at 2026-04-09T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.19133
published_at 2026-04-11T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.19087
published_at 2026-04-12T12:55:00Z
10
value 0.00063
scoring_system epss
scoring_elements 0.19464
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
reference_id 004883.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359622
reference_id 2359622
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359622
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
22
reference_url https://access.redhat.com/security/cve/CVE-2025-32988
reference_id CVE-2025-32988
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/security/cve/CVE-2025-32988
23
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
24
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:16115
25
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:16116
26
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17181
27
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17348
28
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17361
29
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17415
30
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:19088
31
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:22529
32
reference_url https://access.redhat.com/errata/RHSA-2026:7477
reference_id RHSA-2026:7477
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2026:7477
33
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
34
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-32988, GNUTLS-SA-2025-07-08-2
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uc8j-r79v-n7ck
15
url VCID-uws5-j79f-cbar
vulnerability_id VCID-uws5-j79f-cbar
summary gnutls: Use after free in client key_share extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75866
published_at 2026-04-01T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75915
published_at 2026-04-08T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.7587
published_at 2026-04-02T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75902
published_at 2026-04-04T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75882
published_at 2026-04-07T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75928
published_at 2026-04-09T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.75951
published_at 2026-04-11T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78885
published_at 2026-04-12T12:55:00Z
8
value 0.01195
scoring_system epss
scoring_elements 0.789
published_at 2026-04-21T12:55:00Z
9
value 0.01195
scoring_system epss
scoring_elements 0.78876
published_at 2026-04-13T12:55:00Z
10
value 0.01195
scoring_system epss
scoring_elements 0.78905
published_at 2026-04-16T12:55:00Z
11
value 0.01195
scoring_system epss
scoring_elements 0.78902
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
reference_id 1922276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
8
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-20231, GNUTLS-SA-2021-03-10
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uws5-j79f-cbar
16
url VCID-w7f6-5b6h-8kh4
vulnerability_id VCID-w7f6-5b6h-8kh4
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0567.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0567
reference_id
reference_type
scores
0
value 0.01605
scoring_system epss
scoring_elements 0.81691
published_at 2026-04-04T12:55:00Z
1
value 0.01605
scoring_system epss
scoring_elements 0.81758
published_at 2026-04-18T12:55:00Z
2
value 0.01605
scoring_system epss
scoring_elements 0.8172
published_at 2026-04-13T12:55:00Z
3
value 0.01605
scoring_system epss
scoring_elements 0.81727
published_at 2026-04-12T12:55:00Z
4
value 0.01605
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-11T12:55:00Z
5
value 0.01605
scoring_system epss
scoring_elements 0.81719
published_at 2026-04-09T12:55:00Z
6
value 0.01605
scoring_system epss
scoring_elements 0.81715
published_at 2026-04-08T12:55:00Z
7
value 0.01605
scoring_system epss
scoring_elements 0.81668
published_at 2026-04-02T12:55:00Z
8
value 0.01605
scoring_system epss
scoring_elements 0.81688
published_at 2026-04-07T12:55:00Z
9
value 0.01611
scoring_system epss
scoring_elements 0.81799
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
reference_id 004841.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061045
reference_id 1061045
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061045
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1521
reference_id 1521
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1521
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258544
reference_id 2258544
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258544
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
reference_id cpe:/a:redhat:openshift:3.11
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_id cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
19
reference_url https://access.redhat.com/security/cve/CVE-2024-0567
reference_id CVE-2024-0567
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/security/cve/CVE-2024-0567
20
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
21
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:0533
22
reference_url https://access.redhat.com/errata/RHSA-2024:1082
reference_id RHSA-2024:1082
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:1082
23
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:1383
24
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:2094
25
reference_url https://usn.ubuntu.com/6593-1/
reference_id USN-6593-1
reference_type
scores
url https://usn.ubuntu.com/6593-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2024-0567
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7f6-5b6h-8kh4
17
url VCID-wqyp-93bk-vbh2
vulnerability_id VCID-wqyp-93bk-vbh2
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6395.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6395
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20432
published_at 2026-04-04T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20371
published_at 2026-04-02T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22023
published_at 2026-04-21T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22075
published_at 2026-04-13T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22074
published_at 2026-04-16T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22068
published_at 2026-04-18T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22021
published_at 2026-04-07T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22101
published_at 2026-04-08T12:55:00Z
8
value 0.00073
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-09T12:55:00Z
9
value 0.00073
scoring_system epss
scoring_elements 0.22175
published_at 2026-04-11T12:55:00Z
10
value 0.00073
scoring_system epss
scoring_elements 0.22135
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376755
reference_id 2376755
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2376755
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2025-6395
reference_id CVE-2025-6395
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/security/cve/CVE-2025-6395
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:16115
23
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:16116
24
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17181
25
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17348
26
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17361
27
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17415
28
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:19088
29
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:22529
30
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
31
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-6395, GNUTLS-SA-2025-07-08-4
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqyp-93bk-vbh2
18
url VCID-x5jd-qddc-eudq
vulnerability_id VCID-x5jd-qddc-eudq
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12243.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-12243
reference_id
reference_type
scores
0
value 0.01689
scoring_system epss
scoring_elements 0.82187
published_at 2026-04-04T12:55:00Z
1
value 0.01689
scoring_system epss
scoring_elements 0.82259
published_at 2026-04-18T12:55:00Z
2
value 0.01689
scoring_system epss
scoring_elements 0.82223
published_at 2026-04-13T12:55:00Z
3
value 0.01689
scoring_system epss
scoring_elements 0.82228
published_at 2026-04-12T12:55:00Z
4
value 0.01689
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-11T12:55:00Z
5
value 0.01689
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-09T12:55:00Z
6
value 0.01689
scoring_system epss
scoring_elements 0.82209
published_at 2026-04-08T12:55:00Z
7
value 0.01689
scoring_system epss
scoring_elements 0.82166
published_at 2026-04-02T12:55:00Z
8
value 0.01689
scoring_system epss
scoring_elements 0.82183
published_at 2026-04-07T12:55:00Z
9
value 0.01735
scoring_system epss
scoring_elements 0.82514
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-12243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1553
reference_id 1553
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1553
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344615
reference_id 2344615
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2344615
6
reference_url https://gitlab.com/gnutls/libtasn1/-/issues/52
reference_id 52
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://gitlab.com/gnutls/libtasn1/-/issues/52
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9
reference_id cpe:/a:redhat:discovery:1.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2024-12243
reference_id CVE-2024-12243
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/security/cve/CVE-2024-12243
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:17361
23
reference_url https://access.redhat.com/errata/RHSA-2025:4051
reference_id RHSA-2025:4051
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:4051
24
reference_url https://access.redhat.com/errata/RHSA-2025:7076
reference_id RHSA-2025:7076
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:7076
25
reference_url https://access.redhat.com/errata/RHSA-2025:8020
reference_id RHSA-2025:8020
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:8020
26
reference_url https://access.redhat.com/errata/RHSA-2025:8385
reference_id RHSA-2025:8385
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:8385
27
reference_url https://usn.ubuntu.com/7281-1/
reference_id USN-7281-1
reference_type
scores
url https://usn.ubuntu.com/7281-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-12243, GNUTLS-SA-2025-02-07
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5jd-qddc-eudq
Fixing_vulnerabilities
0
url VCID-3qcs-1fcj-m3fw
vulnerability_id VCID-3qcs-1fcj-m3fw
summary gnutls: DTLS client hello contains a random value of all zeroes
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
reference_id
reference_type
scores
0
value 0.11487
scoring_system epss
scoring_elements 0.93575
published_at 2026-04-01T12:55:00Z
1
value 0.11487
scoring_system epss
scoring_elements 0.93642
published_at 2026-04-21T12:55:00Z
2
value 0.11487
scoring_system epss
scoring_elements 0.93611
published_at 2026-04-13T12:55:00Z
3
value 0.11487
scoring_system epss
scoring_elements 0.93631
published_at 2026-04-16T12:55:00Z
4
value 0.11487
scoring_system epss
scoring_elements 0.93637
published_at 2026-04-18T12:55:00Z
5
value 0.11487
scoring_system epss
scoring_elements 0.93584
published_at 2026-04-02T12:55:00Z
6
value 0.11487
scoring_system epss
scoring_elements 0.93592
published_at 2026-04-04T12:55:00Z
7
value 0.11487
scoring_system epss
scoring_elements 0.93593
published_at 2026-04-07T12:55:00Z
8
value 0.11487
scoring_system epss
scoring_elements 0.93602
published_at 2026-04-08T12:55:00Z
9
value 0.11487
scoring_system epss
scoring_elements 0.93605
published_at 2026-04-09T12:55:00Z
10
value 0.11487
scoring_system epss
scoring_elements 0.9361
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/960
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/issues/960
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
9
reference_url https://security.gentoo.org/glsa/202004-06
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/202004-06
10
reference_url https://security.netapp.com/advisory/ntap-20200416-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0002/
11
reference_url https://www.debian.org/security/2020/dsa-4652
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4652
12
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
reference_id
reference_type
scores
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
reference_id 1821896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
reference_id 955556
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
reference_id CVE-2020-11501
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
22
reference_url https://access.redhat.com/errata/RHSA-2020:1998
reference_id RHSA-2020:1998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1998
23
reference_url https://usn.ubuntu.com/4322-1/
reference_id USN-4322-1
reference_type
scores
url https://usn.ubuntu.com/4322-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-11501, GNUTLS-SA-2020-03-31
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qcs-1fcj-m3fw
1
url VCID-6fzu-8998-abdk
vulnerability_id VCID-6fzu-8998-abdk
summary
An information disclosure vulnerability in GnuTLS allow remote
    attackers to obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75032
published_at 2026-04-01T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.75074
published_at 2026-04-08T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75034
published_at 2026-04-02T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.75064
published_at 2026-04-04T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-07T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-09T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.75108
published_at 2026-04-11T12:55:00Z
7
value 0.01521
scoring_system epss
scoring_elements 0.81292
published_at 2026-04-16T12:55:00Z
8
value 0.01521
scoring_system epss
scoring_elements 0.81293
published_at 2026-04-21T12:55:00Z
9
value 0.01521
scoring_system epss
scoring_elements 0.81263
published_at 2026-04-12T12:55:00Z
10
value 0.01521
scoring_system epss
scoring_elements 0.81255
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
reference_id 1843723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
reference_id 962289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
6
reference_url https://security.archlinux.org/ASA-202006-2
reference_id ASA-202006-2
reference_type
scores
url https://security.archlinux.org/ASA-202006-2
7
reference_url https://security.archlinux.org/AVG-1177
reference_id AVG-1177
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1177
8
reference_url https://security.gentoo.org/glsa/202006-01
reference_id GLSA-202006-01
reference_type
scores
url https://security.gentoo.org/glsa/202006-01
9
reference_url https://access.redhat.com/errata/RHSA-2020:2637
reference_id RHSA-2020:2637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2637
10
reference_url https://access.redhat.com/errata/RHSA-2020:2638
reference_id RHSA-2020:2638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2638
11
reference_url https://access.redhat.com/errata/RHSA-2020:2639
reference_id RHSA-2020:2639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2639
12
reference_url https://usn.ubuntu.com/4384-1/
reference_id USN-4384-1
reference_type
scores
url https://usn.ubuntu.com/4384-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-13777, GNUTLS-SA-2020-06-03
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fzu-8998-abdk
2
url VCID-a296-a2f2-kfba
vulnerability_id VCID-a296-a2f2-kfba
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3829.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3829.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3829
reference_id
reference_type
scores
0
value 0.02082
scoring_system epss
scoring_elements 0.83926
published_at 2026-04-01T12:55:00Z
1
value 0.02082
scoring_system epss
scoring_elements 0.84022
published_at 2026-04-21T12:55:00Z
2
value 0.02082
scoring_system epss
scoring_elements 0.84004
published_at 2026-04-11T12:55:00Z
3
value 0.02082
scoring_system epss
scoring_elements 0.83998
published_at 2026-04-12T12:55:00Z
4
value 0.02082
scoring_system epss
scoring_elements 0.83994
published_at 2026-04-13T12:55:00Z
5
value 0.02082
scoring_system epss
scoring_elements 0.84018
published_at 2026-04-16T12:55:00Z
6
value 0.02082
scoring_system epss
scoring_elements 0.8402
published_at 2026-04-18T12:55:00Z
7
value 0.02082
scoring_system epss
scoring_elements 0.8394
published_at 2026-04-02T12:55:00Z
8
value 0.02082
scoring_system epss
scoring_elements 0.83956
published_at 2026-04-04T12:55:00Z
9
value 0.02082
scoring_system epss
scoring_elements 0.83958
published_at 2026-04-07T12:55:00Z
10
value 0.02082
scoring_system epss
scoring_elements 0.83982
published_at 2026-04-08T12:55:00Z
11
value 0.02082
scoring_system epss
scoring_elements 0.83988
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3829
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://gitlab.com/gnutls/gnutls/issues/694
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/issues/694
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7TJIBRJWGWSH6XIO2MXIQ3W6ES4R6I4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7TJIBRJWGWSH6XIO2MXIQ3W6ES4R6I4/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WRSOL66LHP4SD3Y2ECJDOGT4K663ECDU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WRSOL66LHP4SD3Y2ECJDOGT4K663ECDU/
10
reference_url https://security.netapp.com/advisory/ntap-20190619-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190619-0004/
11
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
reference_id
reference_type
scores
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1677048
reference_id 1677048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1677048
13
reference_url https://security.archlinux.org/ASA-201904-2
reference_id ASA-201904-2
reference_type
scores
url https://security.archlinux.org/ASA-201904-2
14
reference_url https://security.archlinux.org/AVG-945
reference_id AVG-945
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-945
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3829
reference_id CVE-2019-3829
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3829
18
reference_url https://security.gentoo.org/glsa/201904-14
reference_id GLSA-201904-14
reference_type
scores
url https://security.gentoo.org/glsa/201904-14
19
reference_url https://access.redhat.com/errata/RHSA-2019:3600
reference_id RHSA-2019:3600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3600
20
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2019-3829
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a296-a2f2-kfba
3
url VCID-k31b-6m7s-pffq
vulnerability_id VCID-k31b-6m7s-pffq
summary
A null pointer dereference in GnuTLS might allow attackers to cause
    a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7507.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7507
reference_id
reference_type
scores
0
value 0.00518
scoring_system epss
scoring_elements 0.66662
published_at 2026-04-01T12:55:00Z
1
value 0.00518
scoring_system epss
scoring_elements 0.66773
published_at 2026-04-21T12:55:00Z
2
value 0.00518
scoring_system epss
scoring_elements 0.66775
published_at 2026-04-16T12:55:00Z
3
value 0.00518
scoring_system epss
scoring_elements 0.66789
published_at 2026-04-18T12:55:00Z
4
value 0.00518
scoring_system epss
scoring_elements 0.66702
published_at 2026-04-02T12:55:00Z
5
value 0.00518
scoring_system epss
scoring_elements 0.66728
published_at 2026-04-04T12:55:00Z
6
value 0.00518
scoring_system epss
scoring_elements 0.667
published_at 2026-04-07T12:55:00Z
7
value 0.00518
scoring_system epss
scoring_elements 0.66749
published_at 2026-04-08T12:55:00Z
8
value 0.00518
scoring_system epss
scoring_elements 0.66764
published_at 2026-04-09T12:55:00Z
9
value 0.00518
scoring_system epss
scoring_elements 0.66784
published_at 2026-04-11T12:55:00Z
10
value 0.00518
scoring_system epss
scoring_elements 0.6677
published_at 2026-04-12T12:55:00Z
11
value 0.00518
scoring_system epss
scoring_elements 0.66741
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7507
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1454621
reference_id 1454621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1454621
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864560
reference_id 864560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864560
5
reference_url https://security.archlinux.org/ASA-201706-12
reference_id ASA-201706-12
reference_type
scores
url https://security.archlinux.org/ASA-201706-12
6
reference_url https://security.archlinux.org/ASA-201707-6
reference_id ASA-201707-6
reference_type
scores
url https://security.archlinux.org/ASA-201707-6
7
reference_url https://security.archlinux.org/AVG-294
reference_id AVG-294
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-294
8
reference_url https://security.archlinux.org/AVG-295
reference_id AVG-295
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-295
9
reference_url https://security.gentoo.org/glsa/201710-15
reference_id GLSA-201710-15
reference_type
scores
url https://security.gentoo.org/glsa/201710-15
10
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
11
reference_url https://usn.ubuntu.com/3318-1/
reference_id USN-3318-1
reference_type
scores
url https://usn.ubuntu.com/3318-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.8-6%2Bdeb8u7
purl pkg:deb/debian/gnutls28@3.3.8-6%2Bdeb8u7
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-334s-gdq8-jucy
1
vulnerability VCID-3qcs-1fcj-m3fw
2
vulnerability VCID-4f3z-x697-abd5
3
vulnerability VCID-5aea-cjz1-jkh1
4
vulnerability VCID-6fzu-8998-abdk
5
vulnerability VCID-6u4f-wt5u-8ueb
6
vulnerability VCID-86j1-j381-cucy
7
vulnerability VCID-92x9-x1ep-cqdn
8
vulnerability VCID-9pdw-udwq-6kbz
9
vulnerability VCID-a18u-4j99-nbf8
10
vulnerability VCID-a296-a2f2-kfba
11
vulnerability VCID-abn3-2b4q-z7ga
12
vulnerability VCID-egeh-jk4m-sba8
13
vulnerability VCID-f5c7-jcd9-67hj
14
vulnerability VCID-gy9e-81rw-pug2
15
vulnerability VCID-jxjc-vjdc-1yfj
16
vulnerability VCID-k31b-6m7s-pffq
17
vulnerability VCID-k5vv-ts4z-j7g5
18
vulnerability VCID-m31f-a3pn-yyb4
19
vulnerability VCID-mtvm-zj2z-m7gf
20
vulnerability VCID-nce1-q8wc-s3ae
21
vulnerability VCID-pf5n-65mk-2ff3
22
vulnerability VCID-q3g5-4xaf-hudf
23
vulnerability VCID-qp8x-339r-pbhe
24
vulnerability VCID-qtsh-kn2d-h7cr
25
vulnerability VCID-qup9-qy11-fqhe
26
vulnerability VCID-r531-qbtt-akgf
27
vulnerability VCID-sp9u-9wwg-b7e9
28
vulnerability VCID-uc8j-r79v-n7ck
29
vulnerability VCID-uws5-j79f-cbar
30
vulnerability VCID-vz27-wyaf-tkcr
31
vulnerability VCID-w7f6-5b6h-8kh4
32
vulnerability VCID-wqyp-93bk-vbh2
33
vulnerability VCID-x5jd-qddc-eudq
34
vulnerability VCID-y71t-sfb1-w3gw
35
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.8-6%252Bdeb8u7
1
url pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
purl pkg:deb/debian/gnutls28@3.5.8-5%2Bdeb9u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-a296-a2f2-kfba
7
vulnerability VCID-abn3-2b4q-z7ga
8
vulnerability VCID-f5c7-jcd9-67hj
9
vulnerability VCID-gy9e-81rw-pug2
10
vulnerability VCID-jxjc-vjdc-1yfj
11
vulnerability VCID-k31b-6m7s-pffq
12
vulnerability VCID-k5vv-ts4z-j7g5
13
vulnerability VCID-pf5n-65mk-2ff3
14
vulnerability VCID-q3g5-4xaf-hudf
15
vulnerability VCID-qp8x-339r-pbhe
16
vulnerability VCID-qtsh-kn2d-h7cr
17
vulnerability VCID-r531-qbtt-akgf
18
vulnerability VCID-sp9u-9wwg-b7e9
19
vulnerability VCID-uc8j-r79v-n7ck
20
vulnerability VCID-uws5-j79f-cbar
21
vulnerability VCID-vz27-wyaf-tkcr
22
vulnerability VCID-w7f6-5b6h-8kh4
23
vulnerability VCID-wqyp-93bk-vbh2
24
vulnerability VCID-x5jd-qddc-eudq
25
vulnerability VCID-zjx8-ydmt-juf3
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-5%252Bdeb9u5
2
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2017-7507
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k31b-6m7s-pffq
4
url VCID-q3g5-4xaf-hudf
vulnerability_id VCID-q3g5-4xaf-hudf
summary gnutls: "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10846.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10846
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02447
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02515
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02529
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.0253
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02534
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02555
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02522
published_at 2026-04-13T12:55:00Z
8
value 0.00014
scoring_system epss
scoring_elements 0.02509
published_at 2026-04-16T12:55:00Z
9
value 0.00014
scoring_system epss
scoring_elements 0.02513
published_at 2026-04-18T12:55:00Z
10
value 0.00014
scoring_system epss
scoring_elements 0.02622
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582574
reference_id 1582574
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582574
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2018-10846
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3g5-4xaf-hudf
5
url VCID-qp8x-339r-pbhe
vulnerability_id VCID-qp8x-339r-pbhe
summary gnutls: Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification and padding oracle verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16868.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16868
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12801
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12899
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12949
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12752
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12832
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12883
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12849
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12811
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12766
published_at 2026-04-13T12:55:00Z
9
value 0.00042
scoring_system epss
scoring_elements 0.12669
published_at 2026-04-16T12:55:00Z
10
value 0.00042
scoring_system epss
scoring_elements 0.12676
published_at 2026-04-18T12:55:00Z
11
value 0.00042
scoring_system epss
scoring_elements 0.12779
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1654929
reference_id 1654929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1654929
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2018-16868
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp8x-339r-pbhe
6
url VCID-r531-qbtt-akgf
vulnerability_id VCID-r531-qbtt-akgf
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3836.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3836.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3836
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.5817
published_at 2026-04-01T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58297
published_at 2026-04-21T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58329
published_at 2026-04-11T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58306
published_at 2026-04-12T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.58286
published_at 2026-04-13T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58318
published_at 2026-04-16T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.5832
published_at 2026-04-18T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58256
published_at 2026-04-02T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58276
published_at 2026-04-04T12:55:00Z
9
value 0.00362
scoring_system epss
scoring_elements 0.58251
published_at 2026-04-07T12:55:00Z
10
value 0.00362
scoring_system epss
scoring_elements 0.58304
published_at 2026-04-08T12:55:00Z
11
value 0.00362
scoring_system epss
scoring_elements 0.5831
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3836
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://gitlab.com/gnutls/gnutls/issues/704
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/issues/704
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
8
reference_url https://security.netapp.com/advisory/ntap-20190502-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190502-0005/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1678411
reference_id 1678411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1678411
10
reference_url https://security.archlinux.org/ASA-201904-2
reference_id ASA-201904-2
reference_type
scores
url https://security.archlinux.org/ASA-201904-2
11
reference_url https://security.archlinux.org/AVG-945
reference_id AVG-945
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-945
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3836
reference_id CVE-2019-3836
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3836
16
reference_url https://security.gentoo.org/glsa/201904-14
reference_id GLSA-201904-14
reference_type
scores
url https://security.gentoo.org/glsa/201904-14
17
reference_url https://access.redhat.com/errata/RHSA-2019:3600
reference_id RHSA-2019:3600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3600
18
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2019-3836
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r531-qbtt-akgf
7
url VCID-vz27-wyaf-tkcr
vulnerability_id VCID-vz27-wyaf-tkcr
summary gnutls: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10845.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10845
reference_id
reference_type
scores
0
value 0.00565
scoring_system epss
scoring_elements 0.68451
published_at 2026-04-21T12:55:00Z
1
value 0.00565
scoring_system epss
scoring_elements 0.68422
published_at 2026-04-13T12:55:00Z
2
value 0.00565
scoring_system epss
scoring_elements 0.68461
published_at 2026-04-16T12:55:00Z
3
value 0.00565
scoring_system epss
scoring_elements 0.68474
published_at 2026-04-18T12:55:00Z
4
value 0.01038
scoring_system epss
scoring_elements 0.77383
published_at 2026-04-04T12:55:00Z
5
value 0.01038
scoring_system epss
scoring_elements 0.77393
published_at 2026-04-08T12:55:00Z
6
value 0.01038
scoring_system epss
scoring_elements 0.77403
published_at 2026-04-09T12:55:00Z
7
value 0.01038
scoring_system epss
scoring_elements 0.77429
published_at 2026-04-11T12:55:00Z
8
value 0.01038
scoring_system epss
scoring_elements 0.77409
published_at 2026-04-12T12:55:00Z
9
value 0.01038
scoring_system epss
scoring_elements 0.7735
published_at 2026-04-01T12:55:00Z
10
value 0.01038
scoring_system epss
scoring_elements 0.77364
published_at 2026-04-07T12:55:00Z
11
value 0.01038
scoring_system epss
scoring_elements 0.77356
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10845
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582572
reference_id 1582572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582572
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2018-10845
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vz27-wyaf-tkcr
8
url VCID-zjx8-ydmt-juf3
vulnerability_id VCID-zjx8-ydmt-juf3
summary gnutls: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10844.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10844
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40036
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40185
published_at 2026-04-02T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.4021
published_at 2026-04-11T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40133
published_at 2026-04-07T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-08T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40198
published_at 2026-04-09T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40172
published_at 2026-04-12T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40154
published_at 2026-04-13T12:55:00Z
8
value 0.00184
scoring_system epss
scoring_elements 0.40203
published_at 2026-04-16T12:55:00Z
9
value 0.00184
scoring_system epss
scoring_elements 0.40173
published_at 2026-04-18T12:55:00Z
10
value 0.00184
scoring_system epss
scoring_elements 0.40095
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10844
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582571
reference_id 1582571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582571
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
aliases CVE-2018-10844
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjx8-ydmt-juf3
Risk_score4.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8