Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/py3-openssl@26.1.0-r0?arch=armhf&distroversion=edge&reponame=community
Typeapk
Namespacealpine
Namepy3-openssl
Version26.1.0-r0
Qualifiers
arch armhf
distroversion edge
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-dt7c-fvqj-2bek
vulnerability_id VCID-dt7c-fvqj-2bek
summary
pyOpenSSL allows TLS connection bypass via unhandled callback exception in set_tlsext_servername_callback
If a user provided callback to `set_tlsext_servername_callback` raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it.

Unhandled exceptions now result in rejecting the connection.

Credit to **Leury Castillo** for reporting this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27448.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27448.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27448
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11263
published_at 2026-04-07T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11208
published_at 2026-04-16T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11474
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11415
published_at 2026-04-02T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11348
published_at 2026-04-13T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11377
published_at 2026-04-12T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.1141
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11403
published_at 2026-04-09T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11345
published_at 2026-04-08T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12386
published_at 2026-04-18T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12408
published_at 2026-05-07T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12273
published_at 2026-05-05T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12362
published_at 2026-04-29T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12476
published_at 2026-04-26T12:55:00Z
14
value 0.00041
scoring_system epss
scoring_elements 0.12509
published_at 2026-04-24T12:55:00Z
15
value 0.00041
scoring_system epss
scoring_elements 0.12502
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27448
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27448
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/pyca/pyopenssl
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U
1
value LOW
scoring_system generic_textual
scoring_elements
url https://github.com/pyca/pyopenssl
5
reference_url https://github.com/pyca/pyopenssl/blob/358cbf29c4e364c59930e53a270116249581eaa3/CHANGELOG.rst#L27
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:17:52Z/
url https://github.com/pyca/pyopenssl/blob/358cbf29c4e364c59930e53a270116249581eaa3/CHANGELOG.rst#L27
6
reference_url https://github.com/pyca/pyopenssl/commit/d41a814759a9fb49584ca8ab3f7295de49a85aa0
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U
1
value LOW
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:17:52Z/
url https://github.com/pyca/pyopenssl/commit/d41a814759a9fb49584ca8ab3f7295de49a85aa0
7
reference_url https://github.com/pyca/pyopenssl/security/advisories/GHSA-vp96-hxj8-p424
reference_id
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
1
value 1.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U
2
value LOW
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T20:17:52Z/
url https://github.com/pyca/pyopenssl/security/advisories/GHSA-vp96-hxj8-p424
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27448
reference_id
reference_type
scores
0
value 1.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U
1
value LOW
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-27448
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448508
reference_id 2448508
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448508
10
reference_url https://github.com/advisories/GHSA-vp96-hxj8-p424
reference_id GHSA-vp96-hxj8-p424
reference_type
scores
0
value LOW
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vp96-hxj8-p424
11
reference_url https://access.redhat.com/errata/RHSA-2026:7224
reference_id RHSA-2026:7224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7224
12
reference_url https://usn.ubuntu.com/8115-1/
reference_id USN-8115-1
reference_type
scores
url https://usn.ubuntu.com/8115-1/
fixed_packages
0
url pkg:apk/alpine/py3-openssl@26.1.0-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/py3-openssl@26.1.0-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/py3-openssl@26.1.0-r0%3Farch=armhf&distroversion=edge&reponame=community
aliases CVE-2026-27448, GHSA-vp96-hxj8-p424
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dt7c-fvqj-2bek
1
url VCID-g6d1-v769-d7gw
vulnerability_id VCID-g6d1-v769-d7gw
summary
references
0
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
fixed_packages
0
url pkg:apk/alpine/py3-openssl@26.1.0-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/py3-openssl@26.1.0-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/py3-openssl@26.1.0-r0%3Farch=armhf&distroversion=edge&reponame=community
aliases CVE-2026-40475
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g6d1-v769-d7gw
2
url VCID-mt1s-vhfk-5bda
vulnerability_id VCID-mt1s-vhfk-5bda
summary
pyOpenSSL DTLS cookie callback buffer overflow
If a user provided callback to `set_cookie_generate_callback` returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer.

Cookie values that are too long are now rejected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27459.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-27459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-27459
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05297
published_at 2026-04-16T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.0535
published_at 2026-04-13T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05359
published_at 2026-04-12T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05371
published_at 2026-04-11T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05402
published_at 2026-04-09T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05379
published_at 2026-04-08T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05346
published_at 2026-04-07T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05324
published_at 2026-04-04T12:55:00Z
8
value 0.0002
scoring_system epss
scoring_elements 0.05292
published_at 2026-04-02T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.05815
published_at 2026-04-18T12:55:00Z
10
value 0.00026
scoring_system epss
scoring_elements 0.07209
published_at 2026-04-29T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07237
published_at 2026-04-26T12:55:00Z
12
value 0.00026
scoring_system epss
scoring_elements 0.07377
published_at 2026-05-07T12:55:00Z
13
value 0.00026
scoring_system epss
scoring_elements 0.07221
published_at 2026-05-05T12:55:00Z
14
value 0.00026
scoring_system epss
scoring_elements 0.07229
published_at 2026-04-24T12:55:00Z
15
value 0.00026
scoring_system epss
scoring_elements 0.07254
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-27459
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27459
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27459
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/pyca/pyopenssl
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pyca/pyopenssl
5
reference_url https://github.com/pyca/pyopenssl/blob/358cbf29c4e364c59930e53a270116249581eaa3/CHANGELOG.rst
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-18T19:52:08Z/
url https://github.com/pyca/pyopenssl/blob/358cbf29c4e364c59930e53a270116249581eaa3/CHANGELOG.rst
6
reference_url https://github.com/pyca/pyopenssl/commit/57f09bb4bb051d3bc2a1abd36e9525313d5cd408
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-18T19:52:08Z/
url https://github.com/pyca/pyopenssl/commit/57f09bb4bb051d3bc2a1abd36e9525313d5cd408
7
reference_url https://github.com/pyca/pyopenssl/security/advisories/GHSA-5pwr-322w-8jr4
reference_id
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
1
value 7.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-18T19:52:08Z/
url https://github.com/pyca/pyopenssl/security/advisories/GHSA-5pwr-322w-8jr4
8
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-27459
reference_id
reference_type
scores
0
value 7.2
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-27459
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448503
reference_id 2448503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448503
10
reference_url https://github.com/advisories/GHSA-5pwr-322w-8jr4
reference_id GHSA-5pwr-322w-8jr4
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5pwr-322w-8jr4
11
reference_url https://access.redhat.com/errata/RHSA-2026:10754
reference_id RHSA-2026:10754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10754
12
reference_url https://access.redhat.com/errata/RHSA-2026:11856
reference_id RHSA-2026:11856
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11856
13
reference_url https://access.redhat.com/errata/RHSA-2026:11916
reference_id RHSA-2026:11916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11916
14
reference_url https://access.redhat.com/errata/RHSA-2026:11996
reference_id RHSA-2026:11996
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11996
15
reference_url https://access.redhat.com/errata/RHSA-2026:13508
reference_id RHSA-2026:13508
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13508
16
reference_url https://access.redhat.com/errata/RHSA-2026:13512
reference_id RHSA-2026:13512
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13512
17
reference_url https://access.redhat.com/errata/RHSA-2026:13545
reference_id RHSA-2026:13545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13545
18
reference_url https://access.redhat.com/errata/RHSA-2026:13553
reference_id RHSA-2026:13553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13553
19
reference_url https://access.redhat.com/errata/RHSA-2026:14835
reference_id RHSA-2026:14835
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:14835
20
reference_url https://access.redhat.com/errata/RHSA-2026:14873
reference_id RHSA-2026:14873
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:14873
21
reference_url https://access.redhat.com/errata/RHSA-2026:14874
reference_id RHSA-2026:14874
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:14874
22
reference_url https://access.redhat.com/errata/RHSA-2026:7224
reference_id RHSA-2026:7224
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:7224
23
reference_url https://access.redhat.com/errata/RHSA-2026:8437
reference_id RHSA-2026:8437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:8437
24
reference_url https://usn.ubuntu.com/8115-1/
reference_id USN-8115-1
reference_type
scores
url https://usn.ubuntu.com/8115-1/
fixed_packages
0
url pkg:apk/alpine/py3-openssl@26.1.0-r0?arch=armhf&distroversion=edge&reponame=community
purl pkg:apk/alpine/py3-openssl@26.1.0-r0?arch=armhf&distroversion=edge&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/py3-openssl@26.1.0-r0%3Farch=armhf&distroversion=edge&reponame=community
aliases CVE-2026-27459, GHSA-5pwr-322w-8jr4
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mt1s-vhfk-5bda
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/py3-openssl@26.1.0-r0%3Farch=armhf&distroversion=edge&reponame=community