Lookup for vulnerable packages by Package URL.

Purlpkg:pypi/pycrypto@2.1.0
Typepypi
Namespace
Namepycrypto
Version2.1.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-gg52-nkc5-4ff1
vulnerability_id VCID-gg52-nkc5-4ff1
summary lib/Crypto/PublicKey/ElGamal.py in PyCrypto through 2.6.1 generates weak ElGamal key parameters, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for PyCrypto's ElGamal implementation.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6594.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-6594
reference_id
reference_type
scores
0
value 0.00798
scoring_system epss
scoring_elements 0.74061
published_at 2026-04-21T12:55:00Z
1
value 0.00798
scoring_system epss
scoring_elements 0.74069
published_at 2026-04-18T12:55:00Z
2
value 0.00798
scoring_system epss
scoring_elements 0.73972
published_at 2026-04-01T12:55:00Z
3
value 0.00798
scoring_system epss
scoring_elements 0.7406
published_at 2026-04-16T12:55:00Z
4
value 0.00798
scoring_system epss
scoring_elements 0.74021
published_at 2026-04-13T12:55:00Z
5
value 0.00798
scoring_system epss
scoring_elements 0.74028
published_at 2026-04-12T12:55:00Z
6
value 0.00798
scoring_system epss
scoring_elements 0.74047
published_at 2026-04-11T12:55:00Z
7
value 0.00798
scoring_system epss
scoring_elements 0.7401
published_at 2026-04-08T12:55:00Z
8
value 0.00798
scoring_system epss
scoring_elements 0.73976
published_at 2026-04-07T12:55:00Z
9
value 0.00798
scoring_system epss
scoring_elements 0.74024
published_at 2026-04-09T12:55:00Z
10
value 0.00798
scoring_system epss
scoring_elements 0.73979
published_at 2026-04-02T12:55:00Z
11
value 0.00798
scoring_system epss
scoring_elements 0.74006
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-6594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6594
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-6528-wvf6-f6qg
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
3
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-6528-wvf6-f6qg
5
reference_url https://github.com/dlitz/pycrypto
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dlitz/pycrypto
6
reference_url https://github.com/dlitz/pycrypto/issues/253
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dlitz/pycrypto/issues/253
7
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2018-97.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2018-97.yaml
8
reference_url https://github.com/TElgamal/attack-on-pycrypto-elgamal
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/TElgamal/attack-on-pycrypto-elgamal
9
reference_url https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2018/02/msg00018.html
10
reference_url https://security.gentoo.org/glsa/202007-62
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202007-62
11
reference_url https://usn.ubuntu.com/3616-1
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3616-1
12
reference_url https://usn.ubuntu.com/3616-1/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3616-1/
13
reference_url https://usn.ubuntu.com/3616-2
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://usn.ubuntu.com/3616-2
14
reference_url https://usn.ubuntu.com/3616-2/
reference_id
reference_type
scores
url https://usn.ubuntu.com/3616-2/
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1542313
reference_id 1542313
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1542313
16
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889998
reference_id 889998
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889998
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2018-6594
reference_id CVE-2018-6594
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2018-6594
fixed_packages
aliases CVE-2018-6594, GHSA-6528-wvf6-f6qg, PYSEC-2018-97
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gg52-nkc5-4ff1
1
url VCID-mrec-hnpq-jqdn
vulnerability_id VCID-mrec-hnpq-jqdn
summary The Crypto.Random.atfork function in PyCrypto before 2.6.1 does not properly reseed the pseudo-random number generator (PRNG) before allowing a child process to access it, which makes it easier for context-dependent attackers to obtain sensitive information by leveraging a race condition in which a child process is created and accesses the PRNG within the same rate-limit period as another process.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1445.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1445.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1445
reference_id
reference_type
scores
0
value 0.00424
scoring_system epss
scoring_elements 0.62219
published_at 2026-04-16T12:55:00Z
1
value 0.00424
scoring_system epss
scoring_elements 0.62209
published_at 2026-04-21T12:55:00Z
2
value 0.00424
scoring_system epss
scoring_elements 0.62225
published_at 2026-04-18T12:55:00Z
3
value 0.00424
scoring_system epss
scoring_elements 0.62152
published_at 2026-04-04T12:55:00Z
4
value 0.00424
scoring_system epss
scoring_elements 0.62119
published_at 2026-04-07T12:55:00Z
5
value 0.00424
scoring_system epss
scoring_elements 0.6206
published_at 2026-04-01T12:55:00Z
6
value 0.00424
scoring_system epss
scoring_elements 0.62169
published_at 2026-04-08T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62187
published_at 2026-04-09T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62206
published_at 2026-04-11T12:55:00Z
9
value 0.00424
scoring_system epss
scoring_elements 0.62196
published_at 2026-04-12T12:55:00Z
10
value 0.00424
scoring_system epss
scoring_elements 0.62175
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1445
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1445
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1445
3
reference_url https://github.com/dlitz/pycrypto/commit/19dcf7b15d61b7dc1a125a367151de40df6ef175
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/dlitz/pycrypto/commit/19dcf7b15d61b7dc1a125a367151de40df6ef175
4
reference_url https://github.com/pycrypto/pycrypto
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pycrypto/pycrypto
5
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2013-29.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2013-29.yaml
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1445
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-1445
7
reference_url http://www.debian.org/security/2013/dsa-2781
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2013/dsa-2781
8
reference_url http://www.openwall.com/lists/oss-security/2013/10/17/3
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value 8.7
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
2
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2013/10/17/3
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1020814
reference_id 1020814
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1020814
10
reference_url https://github.com/advisories/GHSA-x377-f64p-hf5j
reference_id GHSA-x377-f64p-hf5j
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-x377-f64p-hf5j
fixed_packages
0
url pkg:pypi/pycrypto@2.6.1
purl pkg:pypi/pycrypto@2.6.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gg52-nkc5-4ff1
1
vulnerability VCID-qhem-k79n-akc6
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pycrypto@2.6.1
aliases CVE-2013-1445, GHSA-x377-f64p-hf5j, PYSEC-2013-29
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mrec-hnpq-jqdn
2
url VCID-qhem-k79n-akc6
vulnerability_id VCID-qhem-k79n-akc6
summary Heap-based buffer overflow in the ALGnew function in block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows remote attackers to execute arbitrary code as demonstrated by a crafted iv parameter to cryptmsg.py.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7459.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-7459.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-7459
reference_id
reference_type
scores
0
value 0.14532
scoring_system epss
scoring_elements 0.94478
published_at 2026-04-21T12:55:00Z
1
value 0.14532
scoring_system epss
scoring_elements 0.94475
published_at 2026-04-18T12:55:00Z
2
value 0.14532
scoring_system epss
scoring_elements 0.94419
published_at 2026-04-01T12:55:00Z
3
value 0.14532
scoring_system epss
scoring_elements 0.9447
published_at 2026-04-16T12:55:00Z
4
value 0.14532
scoring_system epss
scoring_elements 0.94454
published_at 2026-04-11T12:55:00Z
5
value 0.14532
scoring_system epss
scoring_elements 0.94436
published_at 2026-04-04T12:55:00Z
6
value 0.14532
scoring_system epss
scoring_elements 0.94438
published_at 2026-04-07T12:55:00Z
7
value 0.14532
scoring_system epss
scoring_elements 0.94448
published_at 2026-04-08T12:55:00Z
8
value 0.14532
scoring_system epss
scoring_elements 0.94451
published_at 2026-04-09T12:55:00Z
9
value 0.14532
scoring_system epss
scoring_elements 0.94456
published_at 2026-04-13T12:55:00Z
10
value 0.14532
scoring_system epss
scoring_elements 0.94425
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-7459
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1409754
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1409754
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://github.com/advisories/GHSA-cq27-v7xp-c356
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
2
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
3
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/advisories/GHSA-cq27-v7xp-c356
5
reference_url https://github.com/dlitz/pycrypto
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dlitz/pycrypto
6
reference_url https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4
7
reference_url https://github.com/dlitz/pycrypto/issues/176
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/dlitz/pycrypto/issues/176
8
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2017-94.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2017-94.yaml
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C6BWNADPLKDBBQBUT3P75W7HAJCE7M3B/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJ37R2YLX56YZABFNAOWV4VTHTGYREAE/
13
reference_url https://pony7.fr/ctf:public:32c3:cryptmsg
reference_id
reference_type
scores
url https://pony7.fr/ctf:public:32c3:cryptmsg
14
reference_url https://security.gentoo.org/glsa/201702-14
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/201702-14
15
reference_url http://www.openwall.com/lists/oss-security/2016/12/27/8
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2016/12/27/8
16
reference_url http://www.securityfocus.com/bid/95122
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95122
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-7459
reference_id CVE-2013-7459
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.3
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
2
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2013-7459
18
reference_url https://usn.ubuntu.com/3199-1/
reference_id USN-3199-1
reference_type
scores
url https://usn.ubuntu.com/3199-1/
19
reference_url https://usn.ubuntu.com/3199-2/
reference_id USN-3199-2
reference_type
scores
url https://usn.ubuntu.com/3199-2/
20
reference_url https://usn.ubuntu.com/3199-3/
reference_id USN-3199-3
reference_type
scores
url https://usn.ubuntu.com/3199-3/
fixed_packages
aliases CVE-2013-7459, GHSA-cq27-v7xp-c356, PYSEC-2017-94
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qhem-k79n-akc6
3
url VCID-s32r-berz-qqhf
vulnerability_id VCID-s32r-berz-qqhf
summary PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key.
references
0
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081713.html
1
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081759.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081789.html
3
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2417.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-2417.json
4
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-2417
reference_id
reference_type
scores
0
value 0.04088
scoring_system epss
scoring_elements 0.88589
published_at 2026-04-16T12:55:00Z
1
value 0.04088
scoring_system epss
scoring_elements 0.88575
published_at 2026-04-13T12:55:00Z
2
value 0.04088
scoring_system epss
scoring_elements 0.88583
published_at 2026-04-21T12:55:00Z
3
value 0.04088
scoring_system epss
scoring_elements 0.88571
published_at 2026-04-09T12:55:00Z
4
value 0.04088
scoring_system epss
scoring_elements 0.88566
published_at 2026-04-08T12:55:00Z
5
value 0.04088
scoring_system epss
scoring_elements 0.88548
published_at 2026-04-07T12:55:00Z
6
value 0.04088
scoring_system epss
scoring_elements 0.88544
published_at 2026-04-04T12:55:00Z
7
value 0.04088
scoring_system epss
scoring_elements 0.88527
published_at 2026-04-02T12:55:00Z
8
value 0.04088
scoring_system epss
scoring_elements 0.88519
published_at 2026-04-01T12:55:00Z
9
value 0.04088
scoring_system epss
scoring_elements 0.88585
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-2417
5
reference_url https://bugs.launchpad.net/pycrypto/+bug/985164
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugs.launchpad.net/pycrypto/+bug/985164
6
reference_url http://secunia.com/advisories/49263
reference_id
reference_type
scores
url http://secunia.com/advisories/49263
7
reference_url https://exchange.xforce.ibmcloud.com/vulnerabilities/75871
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://exchange.xforce.ibmcloud.com/vulnerabilities/75871
8
reference_url https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/dlitz/pycrypto/blob/373ea760f21701b162e8c4912a66928ee30d401a/ChangeLog
9
reference_url https://github.com/Legrandin/pycrypto
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/Legrandin/pycrypto
10
reference_url https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/Legrandin/pycrypto/commit/9f912f13df99ad3421eff360d6a62d7dbec755c2
11
reference_url https://github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2012-16.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/pypa/advisory-database/tree/main/vulns/pycrypto/PYSEC-2012-16.yaml
12
reference_url https://hermes.opensuse.org/messages/15083589
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://hermes.opensuse.org/messages/15083589
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-2417
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2012-2417
14
reference_url https://web.archive.org/web/20140724111917/http://secunia.com/advisories/49263
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20140724111917/http://secunia.com/advisories/49263
15
reference_url https://web.archive.org/web/20200228184120/http://www.securityfocus.com/bid/53687
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url https://web.archive.org/web/20200228184120/http://www.securityfocus.com/bid/53687
16
reference_url http://www.debian.org/security/2012/dsa-2502
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.debian.org/security/2012/dsa-2502
17
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2012:117
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.mandriva.com/security/advisories?name=MDVSA-2012:117
18
reference_url http://www.openwall.com/lists/oss-security/2012/05/25/1
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
2
value MODERATE
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2012/05/25/1
19
reference_url http://www.osvdb.org/82279
reference_id
reference_type
scores
url http://www.osvdb.org/82279
20
reference_url http://www.securityfocus.com/bid/53687
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/53687
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=825162
reference_id 825162
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=825162
22
reference_url https://github.com/advisories/GHSA-v367-p58w-98h5
reference_id GHSA-v367-p58w-98h5
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-v367-p58w-98h5
23
reference_url https://security.gentoo.org/glsa/201206-23
reference_id GLSA-201206-23
reference_type
scores
url https://security.gentoo.org/glsa/201206-23
24
reference_url https://usn.ubuntu.com/1484-1/
reference_id USN-1484-1
reference_type
scores
url https://usn.ubuntu.com/1484-1/
fixed_packages
0
url pkg:pypi/pycrypto@2.6
purl pkg:pypi/pycrypto@2.6
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gg52-nkc5-4ff1
1
vulnerability VCID-mrec-hnpq-jqdn
2
vulnerability VCID-qhem-k79n-akc6
resource_url http://public2.vulnerablecode.io/packages/pkg:pypi/pycrypto@2.6
aliases CVE-2012-2417, GHSA-v367-p58w-98h5, PYSEC-2012-16
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s32r-berz-qqhf
Fixing_vulnerabilities
Risk_score4.5
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:pypi/pycrypto@2.1.0