Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/130485?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/130485?format=api", "purl": "pkg:rpm/redhat/openssl096b@0.9.6b-22?arch=42", "type": "rpm", "namespace": "redhat", "name": "openssl096b", "version": "0.9.6b-22", "qualifiers": { "arch": "42" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/43805?format=api", "vulnerability_id": "VCID-fyff-qt58-sufq", "summary": "Three vulnerabilities have been found in OpenSSL via a commercial test\n suite for the TLS protocol developed by Codenomicon Ltd.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0079.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2004-0079.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0079", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84684", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84625", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84627", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84648", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84655", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84672", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.84663", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02277", "scoring_system": "epss", "scoring_elements": "0.8459", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2004-0079" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0079", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0079" }, { "reference_url": "http://www.trustix.org/errata/2004/0012", "reference_id": "0012", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.trustix.org/errata/2004/0012" }, { "reference_url": "http://secunia.com/advisories/11139", "reference_id": "11139", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://secunia.com/advisories/11139" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505", "reference_id": "15505", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15505" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617140", "reference_id": "1617140", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617140" }, { "reference_url": "http://secunia.com/advisories/17381", "reference_id": "17381", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://secunia.com/advisories/17381" }, { "reference_url": "http://secunia.com/advisories/17398", "reference_id": "17398", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://secunia.com/advisories/17398" }, { "reference_url": "http://secunia.com/advisories/17401", "reference_id": "17401", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://secunia.com/advisories/17401" }, { "reference_url": "http://secunia.com/advisories/18247", "reference_id": "18247", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://secunia.com/advisories/18247" }, { "reference_url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html", "reference_id": "2004_07_openssl.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.novell.com/linux/security/advisories/2004_07_openssl.html" }, { "reference_url": "http://www.kb.cert.org/vuls/id/288574", "reference_id": "288574", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.kb.cert.org/vuls/id/288574" }, { "reference_url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524", "reference_id": "57524", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57524" }, { "reference_url": "http://www.securityfocus.com/bid/9899", "reference_id": "9899", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.securityfocus.com/bid/9899" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023", "reference_id": "advisories?name=MDKSA-2004:023", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2004:023" }, { "reference_url": "http://docs.info.apple.com/article.html?artnum=61798", "reference_id": "article.html?artnum=61798", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://docs.info.apple.com/article.html?artnum=61798" }, { "reference_url": "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm", "reference_id": "ASA-2005-239.htm", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://support.avaya.com/elmodocs2/security/ASA-2005-239.htm" }, { "reference_url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml", "reference_id": "cisco-sa-20040317-openssl.shtml", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.cisco.com/warp/public/707/cisco-sa-20040317-openssl.shtml" }, { "reference_url": "http://www.debian.org/security/2004/dsa-465", "reference_id": "dsa-465", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.debian.org/security/2004/dsa-465" }, { "reference_url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html", "reference_id": "engarde_advisory-4135.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.linuxsecurity.com/advisories/engarde_advisory-4135.html" }, { "reference_url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml", "reference_id": "FEDORA-2004-095.shtml", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://fedoranews.org/updates/FEDORA-2004-095.shtml" }, { "reference_url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc", "reference_id": "FreeBSD-SA-04:05.openssl.asc", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:05.openssl.asc" }, { "reference_url": "https://security.gentoo.org/glsa/200403-03", "reference_id": "GLSA-200403-03", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/200403-03" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-200403-03.xml", "reference_id": "glsa-200403-03.xml", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://security.gentoo.org/glsa/glsa-200403-03.xml" }, { "reference_url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834", "reference_id": "?id=a&anuncio=000834", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000834" }, { "reference_url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm", "reference_id": "index.htm", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.uniras.gov.uk/vuls/2004/224012/index.htm" }, { "reference_url": "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US", "reference_id": "index?page=content&id=TE88&locale=EN&userlocale=EN_US", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://support.lexmark.com/index?page=content&id=TE88&locale=EN&userlocale=EN_US" }, { "reference_url": "http://marc.info/?l=bugtraq&m=107953412903636&w=2", "reference_id": "?l=bugtraq&m=107953412903636&w=2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://marc.info/?l=bugtraq&m=107953412903636&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=108403806509920&w=2", "reference_id": "?l=bugtraq&m=108403806509920&w=2", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://marc.info/?l=bugtraq&m=108403806509920&w=2" }, { "reference_url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html", "reference_id": "msg00045.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://lists.apple.com/mhonarc/security-announce/msg00045.html" }, { "reference_url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html", "reference_id": "msg00087.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.redhat.com/archives/fedora-announce-list/2005-October/msg00087.html" }, { "reference_url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc", "reference_id": "NetBSD-SA2004-005.txt.asc", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2004-005.txt.asc" }, { "reference_url": "http://www.ciac.org/ciac/bulletins/o-101.shtml", "reference_id": "o-101.shtml", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.ciac.org/ciac/bulletins/o-101.shtml" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621", "reference_id": "oval%3Aorg.mitre.oval%3Adef%3A2621", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2621" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770", "reference_id": "oval%3Aorg.mitre.oval%3Adef%3A5770", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5770" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870", "reference_id": "oval%3Aorg.mitre.oval%3Adef%3A870", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A870" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975", "reference_id": "oval%3Aorg.mitre.oval%3Adef%3A975", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A975" }, { "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779", "reference_id": "oval%3Aorg.mitre.oval%3Adef%3A9779", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:120", "reference_id": "RHSA-2004:120", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:120" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2004-120.html", "reference_id": "RHSA-2004-120.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2004-120.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:121", "reference_id": "RHSA-2004:121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:121" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2004-121.html", "reference_id": "RHSA-2004-121.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2004-121.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2004:139", "reference_id": "RHSA-2004:139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2004:139" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2004-139.html", "reference_id": "RHSA-2004-139.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2004-139.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:829", "reference_id": "RHSA-2005:829", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:829" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-829.html", "reference_id": "RHSA-2005-829.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2005-829.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2005:830", "reference_id": "RHSA-2005:830", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2005:830" }, { "reference_url": "http://www.redhat.com/support/errata/RHSA-2005-830.html", "reference_id": "RHSA-2005-830.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.redhat.com/support/errata/RHSA-2005-830.html" }, { "reference_url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt", "reference_id": "SCOSA-2004.10.txt", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.10/SCOSA-2004.10.txt" }, { "reference_url": "http://www.openssl.org/news/secadv_20040317.txt", "reference_id": "secadv_20040317.txt", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.openssl.org/news/secadv_20040317.txt" }, { "reference_url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html", "reference_id": "TA04-078A.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.us-cert.gov/cas/techalerts/TA04-078A.html" }, { "reference_url": "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961", "reference_id": "viewer.php?l=slackware-security&y=2004&m=slackware-security.455961", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-08T16:21:54Z/" } ], "url": "http://www.slackware.org/security/viewer.php?l=slackware-security&y=2004&m=slackware-security.455961" } ], "fixed_packages": [], "aliases": [ "CVE-2004-0079" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fyff-qt58-sufq" } ], "fixing_vulnerabilities": [], "risk_score": "3.4", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/openssl096b@0.9.6b-22%3Farch=42" }