Lookup for vulnerable packages by Package URL.

Purlpkg:conan/openssl@1.1.1h
Typeconan
Namespace
Nameopenssl
Version1.1.1h
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version1.1.1w
Latest_non_vulnerable_version3.2.6
Affected_by_vulnerabilities
0
url VCID-hpd4-t99c-zffu
vulnerability_id VCID-hpd4-t99c-zffu
summary
Multiple vulnerabilities have been found in OpenSSL, the worst of
    which could allow remote attackers to cause a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3450.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3450.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-3450
reference_id
reference_type
scores
0
value 0.00504
scoring_system epss
scoring_elements 0.66229
published_at 2026-04-24T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.6622
published_at 2026-04-18T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.66206
published_at 2026-04-21T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66171
published_at 2026-04-13T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66202
published_at 2026-04-12T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.66214
published_at 2026-04-11T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66195
published_at 2026-04-09T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66182
published_at 2026-04-08T12:55:00Z
8
value 0.00504
scoring_system epss
scoring_elements 0.66134
published_at 2026-04-07T12:55:00Z
9
value 0.00504
scoring_system epss
scoring_elements 0.66165
published_at 2026-04-04T12:55:00Z
10
value 0.00504
scoring_system epss
scoring_elements 0.66097
published_at 2026-04-01T12:55:00Z
11
value 0.00504
scoring_system epss
scoring_elements 0.66138
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-3450
2
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3450
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://github.com/alexcrichton/openssl-src-rs
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/alexcrichton/openssl-src-rs
6
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=2a40b7bc7b94dd7de897a74571e7024f0cf0d63b
7
reference_url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44845
8
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10356
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://kc.mcafee.com/corporate/index?page=content&id=SB10356
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CCBFLLVQVILIVGZMBJL3IXZGKWQISYNP/
11
reference_url https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://mta.openssl.org/pipermail/openssl-announce/2021-March/000198.html
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2021-3450
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2021-3450
13
reference_url https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0013
14
reference_url https://rustsec.org/advisories/RUSTSEC-2021-0056.html
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://rustsec.org/advisories/RUSTSEC-2021-0056.html
15
reference_url https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.FreeBSD.org/advisories/FreeBSD-SA-21:07.openssl.asc
16
reference_url https://security.netapp.com/advisory/ntap-20210326-0006
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210326-0006
17
reference_url https://security.netapp.com/advisory/ntap-20210326-0006/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20210326-0006/
18
reference_url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-openssl-2021-GHY28dJd
19
reference_url https://www.openssl.org/news/secadv/20210325.txt
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.openssl.org/news/secadv/20210325.txt
20
reference_url https://www.oracle.com/security-alerts/cpuApr2021.html
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuApr2021.html
21
reference_url https://www.oracle.com/security-alerts/cpuapr2022.html
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuapr2022.html
22
reference_url https://www.oracle.com//security-alerts/cpujul2021.html
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com//security-alerts/cpujul2021.html
23
reference_url https://www.oracle.com/security-alerts/cpujul2022.html
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpujul2022.html
24
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.oracle.com/security-alerts/cpuoct2021.html
25
reference_url https://www.tenable.com/security/tns-2021-05
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2021-05
26
reference_url https://www.tenable.com/security/tns-2021-08
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2021-08
27
reference_url https://www.tenable.com/security/tns-2021-09
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.tenable.com/security/tns-2021-09
28
reference_url http://www.openwall.com/lists/oss-security/2021/03/27/1
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/03/27/1
29
reference_url http://www.openwall.com/lists/oss-security/2021/03/27/2
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/03/27/2
30
reference_url http://www.openwall.com/lists/oss-security/2021/03/28/3
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/03/28/3
31
reference_url http://www.openwall.com/lists/oss-security/2021/03/28/4
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2021/03/28/4
32
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1941547
reference_id 1941547
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1941547
33
reference_url https://security.archlinux.org/ASA-202103-10
reference_id ASA-202103-10
reference_type
scores
url https://security.archlinux.org/ASA-202103-10
34
reference_url https://security.archlinux.org/AVG-1736
reference_id AVG-1736
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1736
35
reference_url https://github.com/advisories/GHSA-8hfj-xrj2-pm22
reference_id GHSA-8hfj-xrj2-pm22
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-8hfj-xrj2-pm22
36
reference_url https://security.gentoo.org/glsa/202103-03
reference_id GLSA-202103-03
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://security.gentoo.org/glsa/202103-03
37
reference_url https://access.redhat.com/errata/RHSA-2021:1024
reference_id RHSA-2021:1024
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1024
38
reference_url https://access.redhat.com/errata/RHSA-2021:1189
reference_id RHSA-2021:1189
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1189
39
reference_url https://access.redhat.com/errata/RHSA-2021:1195
reference_id RHSA-2021:1195
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1195
40
reference_url https://access.redhat.com/errata/RHSA-2021:1196
reference_id RHSA-2021:1196
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1196
41
reference_url https://access.redhat.com/errata/RHSA-2021:1199
reference_id RHSA-2021:1199
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1199
42
reference_url https://access.redhat.com/errata/RHSA-2021:1200
reference_id RHSA-2021:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1200
43
reference_url https://access.redhat.com/errata/RHSA-2021:1202
reference_id RHSA-2021:1202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1202
44
reference_url https://access.redhat.com/errata/RHSA-2021:1203
reference_id RHSA-2021:1203
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1203
fixed_packages
0
url pkg:conan/openssl@1.1.1q
purl pkg:conan/openssl@1.1.1q
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xnhs-4v7t-p3hv
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@1.1.1q
aliases CVE-2021-3450, GHSA-8hfj-xrj2-pm22
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hpd4-t99c-zffu
1
url VCID-xnhs-4v7t-p3hv
vulnerability_id VCID-xnhs-4v7t-p3hv
summary
Excessive Iteration
Issue summary: Checking excessively long DH keys or parameters may be very slow.

Impact summary: Applications that use the functions DH_check(), DH_check_ex()
or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long
delays. Where the key or parameters that are being checked have been obtained
from an untrusted source this may lead to a Denial of Service.

The function DH_check() performs various checks on DH parameters. After fixing
CVE-2023-3446 it was discovered that a large q parameter value can also trigger
an overly long computation during some of these checks. A correct q value,
if present, cannot be larger than the modulus p parameter, thus it is
unnecessary to perform these checks if q is larger than p.

An application that calls DH_check() and supplies a key or parameters obtained
from an untrusted source could be vulnerable to a Denial of Service attack.

The function DH_check() is itself called by a number of other OpenSSL functions.
An application calling any of those other functions may similarly be affected.
The other functions affected by this are DH_check_ex() and
EVP_PKEY_param_check().

Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications
when using the "-check" option.

The OpenSSL SSL/TLS implementation is not affected by this issue.

The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3817.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3817
reference_id
reference_type
scores
0
value 0.0032
scoring_system epss
scoring_elements 0.55026
published_at 2026-04-02T12:55:00Z
1
value 0.0032
scoring_system epss
scoring_elements 0.55004
published_at 2026-04-24T12:55:00Z
2
value 0.0032
scoring_system epss
scoring_elements 0.55052
published_at 2026-04-13T12:55:00Z
3
value 0.0032
scoring_system epss
scoring_elements 0.55028
published_at 2026-04-07T12:55:00Z
4
value 0.0032
scoring_system epss
scoring_elements 0.55077
published_at 2026-04-08T12:55:00Z
5
value 0.0032
scoring_system epss
scoring_elements 0.55076
published_at 2026-04-09T12:55:00Z
6
value 0.0032
scoring_system epss
scoring_elements 0.55089
published_at 2026-04-11T12:55:00Z
7
value 0.0032
scoring_system epss
scoring_elements 0.5507
published_at 2026-04-12T12:55:00Z
8
value 0.0032
scoring_system epss
scoring_elements 0.5509
published_at 2026-04-16T12:55:00Z
9
value 0.0032
scoring_system epss
scoring_elements 0.55094
published_at 2026-04-18T12:55:00Z
10
value 0.0032
scoring_system epss
scoring_elements 0.55072
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3817
3
reference_url http://seclists.org/fulldisclosure/2023/Jul/43
reference_id
reference_type
scores
url http://seclists.org/fulldisclosure/2023/Jul/43
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a1eb62c29db6cb5eec707f9338aee00f44e26f5
6
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=869ad69aadd985c7b8ca6f4e5dd0eb274c9f3644
7
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9002fd07327a91f35ba6c1307e71fa6fd4409b7f
8
reference_url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=91ddeba0f2269b017dc06c46c993a788974b1aa5
9
reference_url https://www.openssl.org/news/secadv/20230731.txt
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://www.openssl.org/news/secadv/20230731.txt
10
reference_url http://www.openwall.com/lists/oss-security/2023/07/31/1
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2023/07/31/1
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2227852
reference_id 2227852
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2227852
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-3817
reference_id CVE-2023-3817
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-3817
13
reference_url https://access.redhat.com/errata/RHSA-2023:5931
reference_id RHSA-2023:5931
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5931
14
reference_url https://access.redhat.com/errata/RHSA-2023:7622
reference_id RHSA-2023:7622
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7622
15
reference_url https://access.redhat.com/errata/RHSA-2023:7623
reference_id RHSA-2023:7623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7623
16
reference_url https://access.redhat.com/errata/RHSA-2023:7625
reference_id RHSA-2023:7625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7625
17
reference_url https://access.redhat.com/errata/RHSA-2023:7626
reference_id RHSA-2023:7626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7626
18
reference_url https://access.redhat.com/errata/RHSA-2023:7877
reference_id RHSA-2023:7877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7877
19
reference_url https://access.redhat.com/errata/RHSA-2024:0154
reference_id RHSA-2024:0154
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0154
20
reference_url https://access.redhat.com/errata/RHSA-2024:0208
reference_id RHSA-2024:0208
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0208
21
reference_url https://access.redhat.com/errata/RHSA-2024:2447
reference_id RHSA-2024:2447
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2447
22
reference_url https://usn.ubuntu.com/6435-1/
reference_id USN-6435-1
reference_type
scores
url https://usn.ubuntu.com/6435-1/
23
reference_url https://usn.ubuntu.com/6435-2/
reference_id USN-6435-2
reference_type
scores
url https://usn.ubuntu.com/6435-2/
24
reference_url https://usn.ubuntu.com/6450-1/
reference_id USN-6450-1
reference_type
scores
url https://usn.ubuntu.com/6450-1/
25
reference_url https://usn.ubuntu.com/6709-1/
reference_id USN-6709-1
reference_type
scores
url https://usn.ubuntu.com/6709-1/
26
reference_url https://usn.ubuntu.com/7894-1/
reference_id USN-7894-1
reference_type
scores
url https://usn.ubuntu.com/7894-1/
fixed_packages
0
url pkg:conan/openssl@1.1.1w
purl pkg:conan/openssl@1.1.1w
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@1.1.1w
1
url pkg:conan/openssl@3.0.12
purl pkg:conan/openssl@3.0.12
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-2by2-tzdd-kkc7
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.0.12
2
url pkg:conan/openssl@3.1.3
purl pkg:conan/openssl@3.1.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.3
aliases CVE-2023-3817
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xnhs-4v7t-p3hv
2
url VCID-yqkw-e99v-jbgt
vulnerability_id VCID-yqkw-e99v-jbgt
summary
A vulnerability in OpenSSL might allow remote attackers to cause a
    Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1971.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-1971.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-1971
reference_id
reference_type
scores
0
value 0.00335
scoring_system epss
scoring_elements 0.56388
published_at 2026-04-13T12:55:00Z
1
value 0.00335
scoring_system epss
scoring_elements 0.56407
published_at 2026-04-12T12:55:00Z
2
value 0.00335
scoring_system epss
scoring_elements 0.56419
published_at 2026-04-09T12:55:00Z
3
value 0.00335
scoring_system epss
scoring_elements 0.56432
published_at 2026-04-11T12:55:00Z
4
value 0.00348
scoring_system epss
scoring_elements 0.5739
published_at 2026-04-08T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57323
published_at 2026-04-24T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57258
published_at 2026-04-01T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.5734
published_at 2026-04-02T12:55:00Z
8
value 0.00348
scoring_system epss
scoring_elements 0.57362
published_at 2026-04-04T12:55:00Z
9
value 0.00348
scoring_system epss
scoring_elements 0.57339
published_at 2026-04-07T12:55:00Z
10
value 0.00348
scoring_system epss
scoring_elements 0.57394
published_at 2026-04-16T12:55:00Z
11
value 0.00348
scoring_system epss
scoring_elements 0.57389
published_at 2026-04-18T12:55:00Z
12
value 0.00348
scoring_system epss
scoring_elements 0.57367
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-1971
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://www.openssl.org/news/secadv/20201208.txt
reference_id
reference_type
scores
url https://www.openssl.org/news/secadv/20201208.txt
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1903409
reference_id 1903409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1903409
6
reference_url https://security.archlinux.org/ASA-202012-24
reference_id ASA-202012-24
reference_type
scores
url https://security.archlinux.org/ASA-202012-24
7
reference_url https://security.archlinux.org/AVG-1335
reference_id AVG-1335
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1335
8
reference_url https://security.archlinux.org/AVG-1404
reference_id AVG-1404
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1404
9
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-1971
reference_id CVE-2020-1971
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2020-1971
10
reference_url https://security.gentoo.org/glsa/202012-13
reference_id GLSA-202012-13
reference_type
scores
url https://security.gentoo.org/glsa/202012-13
11
reference_url https://access.redhat.com/errata/RHSA-2020:5422
reference_id RHSA-2020:5422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5422
12
reference_url https://access.redhat.com/errata/RHSA-2020:5476
reference_id RHSA-2020:5476
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5476
13
reference_url https://access.redhat.com/errata/RHSA-2020:5566
reference_id RHSA-2020:5566
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5566
14
reference_url https://access.redhat.com/errata/RHSA-2020:5588
reference_id RHSA-2020:5588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5588
15
reference_url https://access.redhat.com/errata/RHSA-2020:5623
reference_id RHSA-2020:5623
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5623
16
reference_url https://access.redhat.com/errata/RHSA-2020:5637
reference_id RHSA-2020:5637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5637
17
reference_url https://access.redhat.com/errata/RHSA-2020:5639
reference_id RHSA-2020:5639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5639
18
reference_url https://access.redhat.com/errata/RHSA-2020:5640
reference_id RHSA-2020:5640
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5640
19
reference_url https://access.redhat.com/errata/RHSA-2020:5641
reference_id RHSA-2020:5641
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5641
20
reference_url https://access.redhat.com/errata/RHSA-2020:5642
reference_id RHSA-2020:5642
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5642
21
reference_url https://access.redhat.com/errata/RHSA-2021:0056
reference_id RHSA-2021:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0056
22
reference_url https://access.redhat.com/errata/RHSA-2021:0486
reference_id RHSA-2021:0486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0486
23
reference_url https://access.redhat.com/errata/RHSA-2021:0488
reference_id RHSA-2021:0488
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0488
24
reference_url https://access.redhat.com/errata/RHSA-2021:0489
reference_id RHSA-2021:0489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0489
25
reference_url https://access.redhat.com/errata/RHSA-2021:0491
reference_id RHSA-2021:0491
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0491
26
reference_url https://access.redhat.com/errata/RHSA-2021:0494
reference_id RHSA-2021:0494
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0494
27
reference_url https://access.redhat.com/errata/RHSA-2021:0495
reference_id RHSA-2021:0495
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0495
28
reference_url https://access.redhat.com/errata/RHSA-2021:0949
reference_id RHSA-2021:0949
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0949
29
reference_url https://usn.ubuntu.com/4662-1/
reference_id USN-4662-1
reference_type
scores
url https://usn.ubuntu.com/4662-1/
30
reference_url https://usn.ubuntu.com/4745-1/
reference_id USN-4745-1
reference_type
scores
url https://usn.ubuntu.com/4745-1/
fixed_packages
0
url pkg:conan/openssl@1.1.1i
purl pkg:conan/openssl@1.1.1i
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-xnhs-4v7t-p3hv
resource_url http://public2.vulnerablecode.io/packages/pkg:conan/openssl@1.1.1i
aliases CVE-2020-1971
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yqkw-e99v-jbgt
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:conan/openssl@1.1.1h