Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
Typedeb
Namespacedebian
Namegnutls28
Version3.7.1-5+deb11u3
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version3.7.9-2+deb12u5
Latest_non_vulnerable_version3.7.9-2+deb12u5
Affected_by_vulnerabilities
0
url VCID-92x9-x1ep-cqdn
vulnerability_id VCID-92x9-x1ep-cqdn
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28834.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28834
reference_id
reference_type
scores
0
value 0.01705
scoring_system epss
scoring_elements 0.8227
published_at 2026-04-04T12:55:00Z
1
value 0.01705
scoring_system epss
scoring_elements 0.82292
published_at 2026-04-08T12:55:00Z
2
value 0.01705
scoring_system epss
scoring_elements 0.82265
published_at 2026-04-07T12:55:00Z
3
value 0.01705
scoring_system epss
scoring_elements 0.82251
published_at 2026-04-02T12:55:00Z
4
value 0.02294
scoring_system epss
scoring_elements 0.84718
published_at 2026-04-13T12:55:00Z
5
value 0.02294
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-09T12:55:00Z
6
value 0.02294
scoring_system epss
scoring_elements 0.84729
published_at 2026-04-11T12:55:00Z
7
value 0.02294
scoring_system epss
scoring_elements 0.84724
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
reference_id 004845.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067464
reference_id 1067464
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067464
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269228
reference_id 2269228
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269228
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2024-28834
reference_id CVE-2024-28834
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/security/cve/CVE-2024-28834
21
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
22
reference_url https://access.redhat.com/errata/RHSA-2024:1784
reference_id RHSA-2024:1784
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1784
23
reference_url https://access.redhat.com/errata/RHSA-2024:1879
reference_id RHSA-2024:1879
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1879
24
reference_url https://access.redhat.com/errata/RHSA-2024:1997
reference_id RHSA-2024:1997
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1997
25
reference_url https://access.redhat.com/errata/RHSA-2024:2044
reference_id RHSA-2024:2044
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2044
26
reference_url https://access.redhat.com/errata/RHSA-2024:2570
reference_id RHSA-2024:2570
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2570
27
reference_url https://access.redhat.com/errata/RHSA-2024:2889
reference_id RHSA-2024:2889
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2889
28
reference_url https://usn.ubuntu.com/6733-1/
reference_id USN-6733-1
reference_type
scores
url https://usn.ubuntu.com/6733-1/
29
reference_url https://usn.ubuntu.com/6733-2/
reference_id USN-6733-2
reference_type
scores
url https://usn.ubuntu.com/6733-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-28834, GNUTLS-SA-2023-12-04
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92x9-x1ep-cqdn
1
url VCID-9pdw-udwq-6kbz
vulnerability_id VCID-9pdw-udwq-6kbz
summary gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9820.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9820
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02569
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02855
published_at 2026-04-13T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02875
published_at 2026-04-04T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02883
published_at 2026-04-07T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02884
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02907
published_at 2026-04-09T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02879
published_at 2026-04-11T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.0286
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121146
reference_id 1121146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121146
5
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1732
reference_id 1732
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1732
6
reference_url https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
reference_id 1d56f96f6ab5034d677136b9d50b5a75dff0faf5
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392528
reference_id 2392528
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2392528
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://access.redhat.com/security/cve/CVE-2025-9820
reference_id CVE-2025-9820
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/security/cve/CVE-2025-9820
22
reference_url https://access.redhat.com/errata/RHSA-2026:3477
reference_id RHSA-2026:3477
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:3477
23
reference_url https://access.redhat.com/errata/RHSA-2026:4188
reference_id RHSA-2026:4188
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4188
24
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4655
25
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4943
26
reference_url https://access.redhat.com/errata/RHSA-2026:5585
reference_id RHSA-2026:5585
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:5585
27
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:5606
28
reference_url https://access.redhat.com/errata/RHSA-2026:7329
reference_id RHSA-2026:7329
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:7329
29
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
reference_id security-new.html#GNUTLS-SA-2025-11-18
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
30
reference_url https://usn.ubuntu.com/8043-1/
reference_id USN-8043-1
reference_type
scores
url https://usn.ubuntu.com/8043-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-9820, GNUTLS-SA-2025-11-18
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pdw-udwq-6kbz
2
url VCID-a18u-4j99-nbf8
vulnerability_id VCID-a18u-4j99-nbf8
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0553.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0553
reference_id
reference_type
scores
0
value 0.01029
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-13T12:55:00Z
1
value 0.01029
scoring_system epss
scoring_elements 0.77252
published_at 2026-04-02T12:55:00Z
2
value 0.01029
scoring_system epss
scoring_elements 0.7728
published_at 2026-04-04T12:55:00Z
3
value 0.01029
scoring_system epss
scoring_elements 0.77262
published_at 2026-04-07T12:55:00Z
4
value 0.01029
scoring_system epss
scoring_elements 0.77294
published_at 2026-04-08T12:55:00Z
5
value 0.01029
scoring_system epss
scoring_elements 0.77302
published_at 2026-04-09T12:55:00Z
6
value 0.01029
scoring_system epss
scoring_elements 0.7733
published_at 2026-04-11T12:55:00Z
7
value 0.01029
scoring_system epss
scoring_elements 0.77309
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
reference_id 004841.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061046
reference_id 1061046
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061046
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1522
reference_id 1522
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1522
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258412
reference_id 2258412
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258412
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_id cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0553
reference_id CVE-2024-0553
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/security/cve/CVE-2024-0553
23
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
24
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0533
25
reference_url https://access.redhat.com/errata/RHSA-2024:0627
reference_id RHSA-2024:0627
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0627
26
reference_url https://access.redhat.com/errata/RHSA-2024:0796
reference_id RHSA-2024:0796
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0796
27
reference_url https://access.redhat.com/errata/RHSA-2024:1082
reference_id RHSA-2024:1082
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1082
28
reference_url https://access.redhat.com/errata/RHSA-2024:1108
reference_id RHSA-2024:1108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1108
29
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1383
30
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:2094
31
reference_url https://usn.ubuntu.com/6593-1/
reference_id USN-6593-1
reference_type
scores
url https://usn.ubuntu.com/6593-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2024-0553
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a18u-4j99-nbf8
3
url VCID-abn3-2b4q-z7ga
vulnerability_id VCID-abn3-2b4q-z7ga
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5981.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5981.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5981
reference_id
reference_type
scores
0
value 0.00916
scoring_system epss
scoring_elements 0.75849
published_at 2026-04-02T12:55:00Z
1
value 0.00916
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-04T12:55:00Z
2
value 0.00916
scoring_system epss
scoring_elements 0.75861
published_at 2026-04-07T12:55:00Z
3
value 0.00916
scoring_system epss
scoring_elements 0.75893
published_at 2026-04-08T12:55:00Z
4
value 0.00916
scoring_system epss
scoring_elements 0.75906
published_at 2026-04-09T12:55:00Z
5
value 0.00916
scoring_system epss
scoring_elements 0.75929
published_at 2026-04-11T12:55:00Z
6
value 0.00916
scoring_system epss
scoring_elements 0.75911
published_at 2026-04-12T12:55:00Z
7
value 0.00916
scoring_system epss
scoring_elements 0.75904
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5981
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056188
reference_id 1056188
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056188
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2248445
reference_id 2248445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2248445
6
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
7
reference_url https://access.redhat.com/errata/RHSA-2024:0155
reference_id RHSA-2024:0155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0155
8
reference_url https://access.redhat.com/errata/RHSA-2024:0319
reference_id RHSA-2024:0319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0319
9
reference_url https://access.redhat.com/errata/RHSA-2024:0399
reference_id RHSA-2024:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0399
10
reference_url https://access.redhat.com/errata/RHSA-2024:0451
reference_id RHSA-2024:0451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0451
11
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0533
12
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
13
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
14
reference_url https://usn.ubuntu.com/6499-1/
reference_id USN-6499-1
reference_type
scores
url https://usn.ubuntu.com/6499-1/
15
reference_url https://usn.ubuntu.com/6499-2/
reference_id USN-6499-2
reference_type
scores
url https://usn.ubuntu.com/6499-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2023-5981
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-abn3-2b4q-z7ga
4
url VCID-f5c7-jcd9-67hj
vulnerability_id VCID-f5c7-jcd9-67hj
summary gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14831.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14831
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19773
published_at 2026-04-07T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19853
published_at 2026-04-08T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19907
published_at 2026-04-09T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20176
published_at 2026-04-13T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.2028
published_at 2026-04-11T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20235
published_at 2026-04-12T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20961
published_at 2026-04-02T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.2102
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1773
reference_id 1773
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1773
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423177
reference_id 2423177
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2423177
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9
reference_id cpe:/a:redhat:ai_inference_server:3.2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
reference_id cpe:/o:redhat:rhel_eus:9.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
27
reference_url https://access.redhat.com/security/cve/CVE-2025-14831
reference_id CVE-2025-14831
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/security/cve/CVE-2025-14831
28
reference_url https://access.redhat.com/errata/RHSA-2026:3477
reference_id RHSA-2026:3477
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:3477
29
reference_url https://access.redhat.com/errata/RHSA-2026:4188
reference_id RHSA-2026:4188
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4188
30
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4655
31
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4943
32
reference_url https://access.redhat.com/errata/RHSA-2026:5585
reference_id RHSA-2026:5585
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:5585
33
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:5606
34
reference_url https://access.redhat.com/errata/RHSA-2026:6618
reference_id RHSA-2026:6618
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6618
35
reference_url https://access.redhat.com/errata/RHSA-2026:6630
reference_id RHSA-2026:6630
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6630
36
reference_url https://access.redhat.com/errata/RHSA-2026:6737
reference_id RHSA-2026:6737
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6737
37
reference_url https://access.redhat.com/errata/RHSA-2026:6738
reference_id RHSA-2026:6738
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6738
38
reference_url https://access.redhat.com/errata/RHSA-2026:7329
reference_id RHSA-2026:7329
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:7329
39
reference_url https://access.redhat.com/errata/RHSA-2026:7335
reference_id RHSA-2026:7335
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:7335
40
reference_url https://usn.ubuntu.com/8043-1/
reference_id USN-8043-1
reference_type
scores
url https://usn.ubuntu.com/8043-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-14831, GNUTLS-SA-2026-02-09-2
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f5c7-jcd9-67hj
5
url VCID-pf5n-65mk-2ff3
vulnerability_id VCID-pf5n-65mk-2ff3
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32990.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32990.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32990
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.2197
published_at 2026-04-02T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22023
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23645
published_at 2026-04-11T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23603
published_at 2026-04-12T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23546
published_at 2026-04-13T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23512
published_at 2026-04-07T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23583
published_at 2026-04-08T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23628
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32990
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359620
reference_id 2359620
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359620
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2025-32990
reference_id CVE-2025-32990
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/security/cve/CVE-2025-32990
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:16115
23
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:16116
24
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17181
25
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17348
26
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17361
27
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17415
28
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:19088
29
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:22529
30
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
31
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-32990, GNUTLS-SA-2025-07-08-3
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf5n-65mk-2ff3
6
url VCID-qtsh-kn2d-h7cr
vulnerability_id VCID-qtsh-kn2d-h7cr
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28835.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28835
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10776
published_at 2026-04-08T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.107
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1081
published_at 2026-04-02T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13197
published_at 2026-04-13T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13317
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13284
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13246
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
reference_id 004845.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067463
reference_id 1067463
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067463
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269084
reference_id 2269084
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269084
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
15
reference_url https://access.redhat.com/security/cve/CVE-2024-28835
reference_id CVE-2024-28835
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/security/cve/CVE-2024-28835
16
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
17
reference_url https://access.redhat.com/errata/RHSA-2024:1879
reference_id RHSA-2024:1879
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:1879
18
reference_url https://access.redhat.com/errata/RHSA-2024:2570
reference_id RHSA-2024:2570
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:2570
19
reference_url https://access.redhat.com/errata/RHSA-2024:2889
reference_id RHSA-2024:2889
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:2889
20
reference_url https://usn.ubuntu.com/6733-1/
reference_id USN-6733-1
reference_type
scores
url https://usn.ubuntu.com/6733-1/
21
reference_url https://usn.ubuntu.com/6733-2/
reference_id USN-6733-2
reference_type
scores
url https://usn.ubuntu.com/6733-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-28835, GNUTLS-SA-2024-01-23
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtsh-kn2d-h7cr
7
url VCID-uc8j-r79v-n7ck
vulnerability_id VCID-uc8j-r79v-n7ck
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32988.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32988
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16932
published_at 2026-04-04T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16875
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19034
published_at 2026-04-13T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18994
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19074
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19127
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19133
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19087
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
reference_id 004883.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359622
reference_id 2359622
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359622
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
21
reference_url https://access.redhat.com/security/cve/CVE-2025-32988
reference_id CVE-2025-32988
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/security/cve/CVE-2025-32988
22
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
23
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:16115
24
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:16116
25
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17181
26
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17348
27
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17361
28
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17415
29
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:19088
30
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:22529
31
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
32
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-32988, GNUTLS-SA-2025-07-08-2
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uc8j-r79v-n7ck
8
url VCID-w7f6-5b6h-8kh4
vulnerability_id VCID-w7f6-5b6h-8kh4
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0567.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0567
reference_id
reference_type
scores
0
value 0.01605
scoring_system epss
scoring_elements 0.8172
published_at 2026-04-13T12:55:00Z
1
value 0.01605
scoring_system epss
scoring_elements 0.81668
published_at 2026-04-02T12:55:00Z
2
value 0.01605
scoring_system epss
scoring_elements 0.81691
published_at 2026-04-04T12:55:00Z
3
value 0.01605
scoring_system epss
scoring_elements 0.81688
published_at 2026-04-07T12:55:00Z
4
value 0.01605
scoring_system epss
scoring_elements 0.81715
published_at 2026-04-08T12:55:00Z
5
value 0.01605
scoring_system epss
scoring_elements 0.81719
published_at 2026-04-09T12:55:00Z
6
value 0.01605
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-11T12:55:00Z
7
value 0.01605
scoring_system epss
scoring_elements 0.81727
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
reference_id 004841.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061045
reference_id 1061045
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061045
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1521
reference_id 1521
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1521
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258544
reference_id 2258544
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258544
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
reference_id cpe:/a:redhat:openshift:3.11
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_id cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
19
reference_url https://access.redhat.com/security/cve/CVE-2024-0567
reference_id CVE-2024-0567
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/security/cve/CVE-2024-0567
20
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
21
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:0533
22
reference_url https://access.redhat.com/errata/RHSA-2024:1082
reference_id RHSA-2024:1082
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:1082
23
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:1383
24
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:2094
25
reference_url https://usn.ubuntu.com/6593-1/
reference_id USN-6593-1
reference_type
scores
url https://usn.ubuntu.com/6593-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-f5c7-jcd9-67hj
3
vulnerability VCID-pf5n-65mk-2ff3
4
vulnerability VCID-qtsh-kn2d-h7cr
5
vulnerability VCID-uc8j-r79v-n7ck
6
vulnerability VCID-wqyp-93bk-vbh2
7
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5
aliases CVE-2024-0567
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7f6-5b6h-8kh4
9
url VCID-wqyp-93bk-vbh2
vulnerability_id VCID-wqyp-93bk-vbh2
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6395.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6395
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20371
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20432
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22175
published_at 2026-04-11T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22135
published_at 2026-04-12T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22075
published_at 2026-04-13T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22021
published_at 2026-04-07T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22101
published_at 2026-04-08T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376755
reference_id 2376755
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2376755
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2025-6395
reference_id CVE-2025-6395
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/security/cve/CVE-2025-6395
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:16115
23
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:16116
24
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17181
25
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17348
26
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17361
27
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17415
28
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:19088
29
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:22529
30
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
31
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2025-6395, GNUTLS-SA-2025-07-08-4
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqyp-93bk-vbh2
10
url VCID-x5jd-qddc-eudq
vulnerability_id VCID-x5jd-qddc-eudq
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12243.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-12243
reference_id
reference_type
scores
0
value 0.01689
scoring_system epss
scoring_elements 0.82223
published_at 2026-04-13T12:55:00Z
1
value 0.01689
scoring_system epss
scoring_elements 0.82166
published_at 2026-04-02T12:55:00Z
2
value 0.01689
scoring_system epss
scoring_elements 0.82187
published_at 2026-04-04T12:55:00Z
3
value 0.01689
scoring_system epss
scoring_elements 0.82183
published_at 2026-04-07T12:55:00Z
4
value 0.01689
scoring_system epss
scoring_elements 0.82209
published_at 2026-04-08T12:55:00Z
5
value 0.01689
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-09T12:55:00Z
6
value 0.01689
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-11T12:55:00Z
7
value 0.01689
scoring_system epss
scoring_elements 0.82228
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-12243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1553
reference_id 1553
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1553
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344615
reference_id 2344615
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2344615
6
reference_url https://gitlab.com/gnutls/libtasn1/-/issues/52
reference_id 52
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://gitlab.com/gnutls/libtasn1/-/issues/52
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9
reference_id cpe:/a:redhat:discovery:1.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2024-12243
reference_id CVE-2024-12243
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/security/cve/CVE-2024-12243
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:17361
23
reference_url https://access.redhat.com/errata/RHSA-2025:4051
reference_id RHSA-2025:4051
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:4051
24
reference_url https://access.redhat.com/errata/RHSA-2025:7076
reference_id RHSA-2025:7076
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:7076
25
reference_url https://access.redhat.com/errata/RHSA-2025:8020
reference_id RHSA-2025:8020
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:8020
26
reference_url https://access.redhat.com/errata/RHSA-2025:8385
reference_id RHSA-2025:8385
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:8385
27
reference_url https://usn.ubuntu.com/7281-1/
reference_id USN-7281-1
reference_type
scores
url https://usn.ubuntu.com/7281-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5
aliases CVE-2024-12243, GNUTLS-SA-2025-02-07
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5jd-qddc-eudq
Fixing_vulnerabilities
0
url VCID-3qcs-1fcj-m3fw
vulnerability_id VCID-3qcs-1fcj-m3fw
summary gnutls: DTLS client hello contains a random value of all zeroes
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
reference_id
reference_type
scores
0
value 0.11487
scoring_system epss
scoring_elements 0.93575
published_at 2026-04-01T12:55:00Z
1
value 0.11487
scoring_system epss
scoring_elements 0.93611
published_at 2026-04-13T12:55:00Z
2
value 0.11487
scoring_system epss
scoring_elements 0.93602
published_at 2026-04-08T12:55:00Z
3
value 0.11487
scoring_system epss
scoring_elements 0.93605
published_at 2026-04-09T12:55:00Z
4
value 0.11487
scoring_system epss
scoring_elements 0.9361
published_at 2026-04-12T12:55:00Z
5
value 0.11487
scoring_system epss
scoring_elements 0.93584
published_at 2026-04-02T12:55:00Z
6
value 0.11487
scoring_system epss
scoring_elements 0.93592
published_at 2026-04-04T12:55:00Z
7
value 0.11487
scoring_system epss
scoring_elements 0.93593
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/960
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/issues/960
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
9
reference_url https://security.gentoo.org/glsa/202004-06
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/202004-06
10
reference_url https://security.netapp.com/advisory/ntap-20200416-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0002/
11
reference_url https://www.debian.org/security/2020/dsa-4652
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4652
12
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
reference_id
reference_type
scores
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
reference_id 1821896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
reference_id 955556
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
reference_id CVE-2020-11501
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
22
reference_url https://access.redhat.com/errata/RHSA-2020:1998
reference_id RHSA-2020:1998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1998
23
reference_url https://usn.ubuntu.com/4322-1/
reference_id USN-4322-1
reference_type
scores
url https://usn.ubuntu.com/4322-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-11501, GNUTLS-SA-2020-03-31
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qcs-1fcj-m3fw
1
url VCID-6fzu-8998-abdk
vulnerability_id VCID-6fzu-8998-abdk
summary
An information disclosure vulnerability in GnuTLS allow remote
    attackers to obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75032
published_at 2026-04-01T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-07T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75064
published_at 2026-04-04T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.75074
published_at 2026-04-08T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-09T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75108
published_at 2026-04-11T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.75034
published_at 2026-04-02T12:55:00Z
7
value 0.01521
scoring_system epss
scoring_elements 0.81255
published_at 2026-04-13T12:55:00Z
8
value 0.01521
scoring_system epss
scoring_elements 0.81263
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
reference_id 1843723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
reference_id 962289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
6
reference_url https://security.archlinux.org/ASA-202006-2
reference_id ASA-202006-2
reference_type
scores
url https://security.archlinux.org/ASA-202006-2
7
reference_url https://security.archlinux.org/AVG-1177
reference_id AVG-1177
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1177
8
reference_url https://security.gentoo.org/glsa/202006-01
reference_id GLSA-202006-01
reference_type
scores
url https://security.gentoo.org/glsa/202006-01
9
reference_url https://access.redhat.com/errata/RHSA-2020:2637
reference_id RHSA-2020:2637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2637
10
reference_url https://access.redhat.com/errata/RHSA-2020:2638
reference_id RHSA-2020:2638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2638
11
reference_url https://access.redhat.com/errata/RHSA-2020:2639
reference_id RHSA-2020:2639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2639
12
reference_url https://usn.ubuntu.com/4384-1/
reference_id USN-4384-1
reference_type
scores
url https://usn.ubuntu.com/4384-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
purl pkg:deb/debian/gnutls28@3.6.7-4%2Bdeb10u8
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-3qcs-1fcj-m3fw
1
vulnerability VCID-6fzu-8998-abdk
2
vulnerability VCID-86j1-j381-cucy
3
vulnerability VCID-92x9-x1ep-cqdn
4
vulnerability VCID-9pdw-udwq-6kbz
5
vulnerability VCID-a18u-4j99-nbf8
6
vulnerability VCID-abn3-2b4q-z7ga
7
vulnerability VCID-f5c7-jcd9-67hj
8
vulnerability VCID-gy9e-81rw-pug2
9
vulnerability VCID-jxjc-vjdc-1yfj
10
vulnerability VCID-k5vv-ts4z-j7g5
11
vulnerability VCID-pf5n-65mk-2ff3
12
vulnerability VCID-qtsh-kn2d-h7cr
13
vulnerability VCID-sp9u-9wwg-b7e9
14
vulnerability VCID-uc8j-r79v-n7ck
15
vulnerability VCID-uws5-j79f-cbar
16
vulnerability VCID-w7f6-5b6h-8kh4
17
vulnerability VCID-wqyp-93bk-vbh2
18
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-4%252Bdeb10u8
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-13777, GNUTLS-SA-2020-06-03
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fzu-8998-abdk
2
url VCID-86j1-j381-cucy
vulnerability_id VCID-86j1-j381-cucy
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2509.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2509
reference_id
reference_type
scores
0
value 0.00628
scoring_system epss
scoring_elements 0.70245
published_at 2026-04-13T12:55:00Z
1
value 0.00628
scoring_system epss
scoring_elements 0.70257
published_at 2026-04-12T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75712
published_at 2026-04-02T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-09T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75743
published_at 2026-04-04T12:55:00Z
7
value 0.00908
scoring_system epss
scoring_elements 0.75722
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
reference_id 004746.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108977
reference_id 2108977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108977
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
reference_id 6FL27JS3VM74YEQU7PGB62USO3KSBYZX
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
7
reference_url https://access.redhat.com/security/cve/CVE-2022-2509
reference_id CVE-2022-2509
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://access.redhat.com/security/cve/CVE-2022-2509
8
reference_url https://www.debian.org/security/2022/dsa-5203
reference_id dsa-5203
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://www.debian.org/security/2022/dsa-5203
9
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
10
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
11
reference_url https://access.redhat.com/errata/RHSA-2022:6854
reference_id RHSA-2022:6854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6854
12
reference_url https://access.redhat.com/errata/RHSA-2022:7105
reference_id RHSA-2022:7105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7105
13
reference_url https://usn.ubuntu.com/5550-1/
reference_id USN-5550-1
reference_type
scores
url https://usn.ubuntu.com/5550-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2022-2509, GNUTLS-SA-2022-07-07
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86j1-j381-cucy
3
url VCID-gy9e-81rw-pug2
vulnerability_id VCID-gy9e-81rw-pug2
summary GnuTLS: Null pointer dereference in MD_UPDATE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4209.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4209
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56804
published_at 2026-04-01T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56898
published_at 2026-04-02T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56919
published_at 2026-04-04T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.56895
published_at 2026-04-07T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56947
published_at 2026-04-08T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.5695
published_at 2026-04-09T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56958
published_at 2026-04-11T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56938
published_at 2026-04-12T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56915
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044156
reference_id 2044156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044156
5
reference_url https://usn.ubuntu.com/5550-1/
reference_id USN-5550-1
reference_type
scores
url https://usn.ubuntu.com/5550-1/
6
reference_url https://usn.ubuntu.com/5750-1/
reference_id USN-5750-1
reference_type
scores
url https://usn.ubuntu.com/5750-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-4209
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gy9e-81rw-pug2
4
url VCID-jxjc-vjdc-1yfj
vulnerability_id VCID-jxjc-vjdc-1yfj
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0361.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0361
reference_id
reference_type
scores
0
value 0.03615
scoring_system epss
scoring_elements 0.87746
published_at 2026-04-02T12:55:00Z
1
value 0.03615
scoring_system epss
scoring_elements 0.87759
published_at 2026-04-04T12:55:00Z
2
value 0.03615
scoring_system epss
scoring_elements 0.87762
published_at 2026-04-07T12:55:00Z
3
value 0.03615
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-08T12:55:00Z
4
value 0.03615
scoring_system epss
scoring_elements 0.8779
published_at 2026-04-09T12:55:00Z
5
value 0.03615
scoring_system epss
scoring_elements 0.87801
published_at 2026-04-11T12:55:00Z
6
value 0.03615
scoring_system epss
scoring_elements 0.87795
published_at 2026-04-12T12:55:00Z
7
value 0.03615
scoring_system epss
scoring_elements 0.87794
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162596
reference_id 2162596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162596
5
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
6
reference_url https://access.redhat.com/errata/RHSA-2023:1141
reference_id RHSA-2023:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1141
7
reference_url https://access.redhat.com/errata/RHSA-2023:1200
reference_id RHSA-2023:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1200
8
reference_url https://access.redhat.com/errata/RHSA-2023:1569
reference_id RHSA-2023:1569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1569
9
reference_url https://access.redhat.com/errata/RHSA-2023:3361
reference_id RHSA-2023:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3361
10
reference_url https://usn.ubuntu.com/5901-1/
reference_id USN-5901-1
reference_type
scores
url https://usn.ubuntu.com/5901-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2023-0361
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxjc-vjdc-1yfj
5
url VCID-k5vv-ts4z-j7g5
vulnerability_id VCID-k5vv-ts4z-j7g5
summary gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
reference_id
reference_type
scores
0
value 0.00844
scoring_system epss
scoring_elements 0.74724
published_at 2026-04-01T12:55:00Z
1
value 0.00844
scoring_system epss
scoring_elements 0.74768
published_at 2026-04-13T12:55:00Z
2
value 0.00844
scoring_system epss
scoring_elements 0.74727
published_at 2026-04-02T12:55:00Z
3
value 0.00844
scoring_system epss
scoring_elements 0.74754
published_at 2026-04-04T12:55:00Z
4
value 0.00844
scoring_system epss
scoring_elements 0.74728
published_at 2026-04-07T12:55:00Z
5
value 0.00844
scoring_system epss
scoring_elements 0.7476
published_at 2026-04-08T12:55:00Z
6
value 0.00844
scoring_system epss
scoring_elements 0.74775
published_at 2026-04-09T12:55:00Z
7
value 0.00844
scoring_system epss
scoring_elements 0.74799
published_at 2026-04-11T12:55:00Z
8
value 0.00844
scoring_system epss
scoring_elements 0.74778
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
reference_id 1922275
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://security.netapp.com/advisory/ntap-20210416-0005/
reference_id ntap-20210416-0005
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://security.netapp.com/advisory/ntap-20210416-0005/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
reference_id OSLAE6PP33A7VYRYMYMUVB3U6B26GZER
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
9
reference_url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_id r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_id r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_id r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_id r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_id r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_id rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_id rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_id rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
17
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
18
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
reference_id security-new.html#GNUTLS-SA-2021-03-10
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
19
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-20232
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5vv-ts4z-j7g5
6
url VCID-sp9u-9wwg-b7e9
vulnerability_id VCID-sp9u-9wwg-b7e9
summary
A flaw was found in GnuTLS, possibly allowing a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24659.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24659
reference_id
reference_type
scores
0
value 0.03633
scoring_system epss
scoring_elements 0.87779
published_at 2026-04-01T12:55:00Z
1
value 0.03633
scoring_system epss
scoring_elements 0.87789
published_at 2026-04-02T12:55:00Z
2
value 0.03633
scoring_system epss
scoring_elements 0.878
published_at 2026-04-04T12:55:00Z
3
value 0.03633
scoring_system epss
scoring_elements 0.87804
published_at 2026-04-07T12:55:00Z
4
value 0.03633
scoring_system epss
scoring_elements 0.87826
published_at 2026-04-08T12:55:00Z
5
value 0.03633
scoring_system epss
scoring_elements 0.87832
published_at 2026-04-09T12:55:00Z
6
value 0.03633
scoring_system epss
scoring_elements 0.87844
published_at 2026-04-11T12:55:00Z
7
value 0.03633
scoring_system epss
scoring_elements 0.87838
published_at 2026-04-12T12:55:00Z
8
value 0.03633
scoring_system epss
scoring_elements 0.87837
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872021
reference_id 1872021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872021
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969547
reference_id 969547
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969547
6
reference_url https://security.gentoo.org/glsa/202009-01
reference_id GLSA-202009-01
reference_type
scores
url https://security.gentoo.org/glsa/202009-01
7
reference_url https://access.redhat.com/errata/RHSA-2020:5483
reference_id RHSA-2020:5483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5483
8
reference_url https://usn.ubuntu.com/4491-1/
reference_id USN-4491-1
reference_type
scores
url https://usn.ubuntu.com/4491-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2020-24659, GNUTLS-SA-2020-09-04
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sp9u-9wwg-b7e9
7
url VCID-uws5-j79f-cbar
vulnerability_id VCID-uws5-j79f-cbar
summary gnutls: Use after free in client key_share extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75866
published_at 2026-04-01T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75882
published_at 2026-04-07T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.75902
published_at 2026-04-04T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75915
published_at 2026-04-08T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75928
published_at 2026-04-09T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75951
published_at 2026-04-11T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.7587
published_at 2026-04-02T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78876
published_at 2026-04-13T12:55:00Z
8
value 0.01195
scoring_system epss
scoring_elements 0.78885
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
reference_id 1922276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
8
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-92x9-x1ep-cqdn
1
vulnerability VCID-9pdw-udwq-6kbz
2
vulnerability VCID-a18u-4j99-nbf8
3
vulnerability VCID-abn3-2b4q-z7ga
4
vulnerability VCID-f5c7-jcd9-67hj
5
vulnerability VCID-pf5n-65mk-2ff3
6
vulnerability VCID-qtsh-kn2d-h7cr
7
vulnerability VCID-uc8j-r79v-n7ck
8
vulnerability VCID-w7f6-5b6h-8kh4
9
vulnerability VCID-wqyp-93bk-vbh2
10
vulnerability VCID-x5jd-qddc-eudq
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3
aliases CVE-2021-20231, GNUTLS-SA-2021-03-10
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uws5-j79f-cbar
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3