Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/openvpn@2.4.2-r0?arch=aarch64&distroversion=v3.6&reponame=main
Typeapk
Namespacealpine
Nameopenvpn
Version2.4.2-r0
Qualifiers
arch aarch64
distroversion v3.6
reponame main
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-crrt-th9e-z3ay
vulnerability_id VCID-crrt-th9e-z3ay
summary OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7479
reference_id
reference_type
scores
0
value 0.00372
scoring_system epss
scoring_elements 0.58996
published_at 2026-04-16T12:55:00Z
1
value 0.00372
scoring_system epss
scoring_elements 0.58859
published_at 2026-04-01T12:55:00Z
2
value 0.00372
scoring_system epss
scoring_elements 0.58933
published_at 2026-04-02T12:55:00Z
3
value 0.00372
scoring_system epss
scoring_elements 0.58956
published_at 2026-04-04T12:55:00Z
4
value 0.00372
scoring_system epss
scoring_elements 0.58922
published_at 2026-04-07T12:55:00Z
5
value 0.00372
scoring_system epss
scoring_elements 0.58974
published_at 2026-04-08T12:55:00Z
6
value 0.00372
scoring_system epss
scoring_elements 0.5898
published_at 2026-04-12T12:55:00Z
7
value 0.00372
scoring_system epss
scoring_elements 0.58999
published_at 2026-04-18T12:55:00Z
8
value 0.00372
scoring_system epss
scoring_elements 0.58962
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7479
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479
2
reference_url https://security.archlinux.org/ASA-201705-16
reference_id ASA-201705-16
reference_type
scores
url https://security.archlinux.org/ASA-201705-16
3
reference_url https://security.archlinux.org/AVG-271
reference_id AVG-271
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-271
4
reference_url https://usn.ubuntu.com/3284-1/
reference_id USN-3284-1
reference_type
scores
url https://usn.ubuntu.com/3284-1/
5
reference_url https://usn.ubuntu.com/3339-1/
reference_id USN-3339-1
reference_type
scores
url https://usn.ubuntu.com/3339-1/
fixed_packages
0
url pkg:apk/alpine/openvpn@2.4.2-r0?arch=aarch64&distroversion=v3.6&reponame=main
purl pkg:apk/alpine/openvpn@2.4.2-r0?arch=aarch64&distroversion=v3.6&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openvpn@2.4.2-r0%3Farch=aarch64&distroversion=v3.6&reponame=main
aliases CVE-2017-7479
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-crrt-th9e-z3ay
1
url VCID-wk2j-j9y1-5yhp
vulnerability_id VCID-wk2j-j9y1-5yhp
summary OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7478
reference_id
reference_type
scores
0
value 0.04599
scoring_system epss
scoring_elements 0.89259
published_at 2026-04-18T12:55:00Z
1
value 0.04599
scoring_system epss
scoring_elements 0.89199
published_at 2026-04-01T12:55:00Z
2
value 0.04599
scoring_system epss
scoring_elements 0.89204
published_at 2026-04-02T12:55:00Z
3
value 0.04599
scoring_system epss
scoring_elements 0.89219
published_at 2026-04-04T12:55:00Z
4
value 0.04599
scoring_system epss
scoring_elements 0.89221
published_at 2026-04-07T12:55:00Z
5
value 0.04599
scoring_system epss
scoring_elements 0.89239
published_at 2026-04-08T12:55:00Z
6
value 0.04599
scoring_system epss
scoring_elements 0.89244
published_at 2026-04-09T12:55:00Z
7
value 0.04599
scoring_system epss
scoring_elements 0.89253
published_at 2026-04-11T12:55:00Z
8
value 0.04599
scoring_system epss
scoring_elements 0.89249
published_at 2026-04-12T12:55:00Z
9
value 0.04599
scoring_system epss
scoring_elements 0.89246
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7478
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478
2
reference_url https://security.archlinux.org/ASA-201705-16
reference_id ASA-201705-16
reference_type
scores
url https://security.archlinux.org/ASA-201705-16
3
reference_url https://security.archlinux.org/AVG-271
reference_id AVG-271
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-271
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41993.py
reference_id CVE-2017-7478
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41993.py
5
reference_url https://ostif.org/the-openvpn-2-4-0-audit-by-ostif-and-quarkslab-results/
reference_id CVE-2017-7478
reference_type exploit
scores
url https://ostif.org/the-openvpn-2-4-0-audit-by-ostif-and-quarkslab-results/
6
reference_url https://usn.ubuntu.com/3284-1/
reference_id USN-3284-1
reference_type
scores
url https://usn.ubuntu.com/3284-1/
fixed_packages
0
url pkg:apk/alpine/openvpn@2.4.2-r0?arch=aarch64&distroversion=v3.6&reponame=main
purl pkg:apk/alpine/openvpn@2.4.2-r0?arch=aarch64&distroversion=v3.6&reponame=main
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/openvpn@2.4.2-r0%3Farch=aarch64&distroversion=v3.6&reponame=main
aliases CVE-2017-7478
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wk2j-j9y1-5yhp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/openvpn@2.4.2-r0%3Farch=aarch64&distroversion=v3.6&reponame=main