Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1051378?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1051378?format=api", "purl": "pkg:deb/debian/openvpn@2.5.1-3", "type": "deb", "namespace": "debian", "name": "openvpn", "version": "2.5.1-3", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.7.1-1~bpo13+1", "latest_non_vulnerable_version": "2.7.1-1~bpo13+1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60884?format=api", "vulnerability_id": "VCID-faqk-wzr3-77be", "summary": "Multiple vulnerabilities have been discovered in OpenVPN, the worst of which could lead to information disclosure.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0547", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65939", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65868", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65909", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65943", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65973", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65987", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65957", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68772", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68721", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68732", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68711", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.6876", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00573", "scoring_system": "epss", "scoring_elements": "0.68766", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2022-0547" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0547", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0547" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008015", "reference_id": "1008015", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1008015" }, { "reference_url": "https://openvpn.net/community-downloads/", "reference_id": "community-downloads", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://openvpn.net/community-downloads/" }, { "reference_url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547", "reference_id": "CVE-2022-0547", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2022-0547" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/", "reference_id": "GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GFXJ35WKPME4HYNQCQNAJHLCZOJL2SAE/" }, { "reference_url": "https://security.gentoo.org/glsa/202409-08", "reference_id": "GLSA-202409-08", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202409-08" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/", "reference_id": "R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R36OYC5SJ6FLPVAYJYYT4MOJ2I7MGYFF/" }, { "reference_url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements", "reference_id": "SecurityAnnouncements", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:37Z/" } ], "url": "https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements" }, { "reference_url": "https://usn.ubuntu.com/5347-1/", "reference_id": "USN-5347-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/5347-1/" }, { "reference_url": "https://usn.ubuntu.com/6850-1/", "reference_id": "USN-6850-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6850-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051379?format=api", "purl": "pkg:deb/debian/openvpn@2.6.3-1%2Bdeb12u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-m93u-qysb-aqe8" }, { "vulnerability": "VCID-pndq-nwkn-cya3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.6.3-1%252Bdeb12u4" } ], "aliases": [ "CVE-2022-0547" ], "risk_score": 4.4, "exploitability": "0.5", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-faqk-wzr3-77be" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96309?format=api", "vulnerability_id": "VCID-htt5-x61p-2qar", "summary": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which an attacker controlling the server can use to inject unexpected arbitrary data ending up in client logs.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5594", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.5149", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51582", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51591", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.5157", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51524", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.5153", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51491", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51477", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51531", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51528", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51572", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00282", "scoring_system": "epss", "scoring_elements": "0.51539", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-5594" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5594", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5594" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074488", "reference_id": "1074488", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1074488" }, { "reference_url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594", "reference_id": "CVE-2024-5594", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-06T16:56:30Z/" } ], "url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594" }, { "reference_url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html", "reference_id": "msg07634.html", "reference_type": "", "scores": [ { "value": "9.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-06T16:56:30Z/" } ], "url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html" }, { "reference_url": "https://usn.ubuntu.com/6860-1/", "reference_id": "USN-6860-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6860-1/" }, { "reference_url": "https://usn.ubuntu.com/7340-1/", "reference_id": "USN-7340-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7340-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051379?format=api", "purl": "pkg:deb/debian/openvpn@2.6.3-1%2Bdeb12u4", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-m93u-qysb-aqe8" }, { "vulnerability": "VCID-pndq-nwkn-cya3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.6.3-1%252Bdeb12u4" } ], "aliases": [ "CVE-2024-5594" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-htt5-x61p-2qar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354132?format=api", "vulnerability_id": "VCID-m93u-qysb-aqe8", "summary": "", "references": [ { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35058", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-35058" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077810?format=api", "purl": "pkg:deb/debian/openvpn@2.7.1-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.7.1-1~bpo13%252B1" } ], "aliases": [ "CVE-2026-35058" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m93u-qysb-aqe8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/354134?format=api", "vulnerability_id": "VCID-pndq-nwkn-cya3", "summary": "", "references": [ { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-40215" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1077810?format=api", "purl": "pkg:deb/debian/openvpn@2.7.1-1~bpo13%2B1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.7.1-1~bpo13%252B1" } ], "aliases": [ "CVE-2026-40215" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pndq-nwkn-cya3" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/94338?format=api", "vulnerability_id": "VCID-69y7-qv5p-gqar", "summary": "An issue was discovered in OpenVPN 2.4.x before 2.4.9. An attacker can inject a data channel v2 (P_DATA_V2) packet using a victim's peer-id. Normally such packets are dropped, but if this packet arrives before the data channel crypto parameters have been initialized, the victim's connection will be dropped. This requires careful timing due to the small time window (usually within a few seconds) between the victim client connection starting and the server PUSH_REPLY response back to the client. This attack will only work if Negotiable Cipher Parameters (NCP) is in use.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11810", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84975", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84976", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84845", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84879", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84881", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84904", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84911", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84929", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84928", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84922", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84944", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84945", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84941", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02358", "scoring_system": "epss", "scoring_elements": "0.84967", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-11810" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11810" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "3.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://security.archlinux.org/ASA-202004-16", "reference_id": "ASA-202004-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-202004-16" }, { "reference_url": "https://security.archlinux.org/AVG-1135", "reference_id": "AVG-1135", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1135" }, { "reference_url": "https://usn.ubuntu.com/4933-1/", "reference_id": "USN-4933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4933-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051378?format=api", "purl": "pkg:deb/debian/openvpn@2.5.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-m93u-qysb-aqe8" }, { "vulnerability": "VCID-pndq-nwkn-cya3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.5.1-3" } ], "aliases": [ "CVE-2020-11810" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-69y7-qv5p-gqar" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/51948?format=api", "vulnerability_id": "VCID-j1d4-djxq-dqct", "summary": "A vulnerability has been found in OpenVPN, allowing attackers to\n bypass the authentication process.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15078", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56112", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56136", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56049", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56158", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56178", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56215", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56225", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56201", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56184", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56217", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.5622", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56189", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00333", "scoring_system": "epss", "scoring_elements": "0.56114", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-15078" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15078", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15078" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987380", "reference_id": "987380", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=987380" }, { "reference_url": "https://security.archlinux.org/AVG-1861", "reference_id": "AVG-1861", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1861" }, { "reference_url": "https://security.gentoo.org/glsa/202105-25", "reference_id": "GLSA-202105-25", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202105-25" }, { "reference_url": "https://usn.ubuntu.com/4933-1/", "reference_id": "USN-4933-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/4933-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1051378?format=api", "purl": "pkg:deb/debian/openvpn@2.5.1-3", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-faqk-wzr3-77be" }, { "vulnerability": "VCID-htt5-x61p-2qar" }, { "vulnerability": "VCID-m93u-qysb-aqe8" }, { "vulnerability": "VCID-pndq-nwkn-cya3" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.5.1-3" } ], "aliases": [ "CVE-2020-15078" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j1d4-djxq-dqct" } ], "risk_score": "4.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openvpn@2.5.1-3" }