{"url":"http://public2.vulnerablecode.io/api/packages/107585?format=json","purl":"pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-23.GA.jbcs?arch=el7","type":"rpm","namespace":"redhat","name":"jbcs-httpd24-mod_security","version":"2.9.1-23.GA.jbcs","qualifiers":{"arch":"el7"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34247?format=json","vulnerability_id":"VCID-4qqa-zm88-w7ca","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which might allow attackers to access sensitive information.","references":[{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-0286.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-0286.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3731.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3731.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3731","reference_id":"","reference_type":"","scores":[{"value":"0.12609","scoring_system":"epss","scoring_elements":"0.93922","published_at":"2026-04-01T12:55:00Z"},{"value":"0.12609","scoring_system":"epss","scoring_elements":"0.93958","published_at":"2026-04-13T12:55:00Z"},{"value":"0.12609","scoring_system":"epss","scoring_elements":"0.9394","published_at":"2026-04-04T12:55:00Z"},{"value":"0.12609","scoring_system":"epss","scoring_elements":"0.93943","published_at":"2026-04-07T12:55:00Z"},{"value":"0.12609","scoring_system":"epss","scoring_elements":"0.93952","published_at":"2026-04-08T12:55:00Z"},{"value":"0.12609","scoring_system":"epss","scoring_elements":"0.93955","published_at":"2026-04-09T12:55:00Z"},{"value":"0.12609","scoring_system":"epss","scoring_elements":"0.93959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.12609","scoring_system":"epss","scoring_elements":"0.93931","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3731"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7056"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/openssl/openssl/commit/00d965474b22b54e4275232bc71ee0c699c5cd21"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171019-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20171019-0002/"},{"reference_url":"https://security.paloaltonetworks.com/CVE-2017-3731","reference_id":"","reference_type":"","scores":[],"url":"https://security.paloaltonetworks.com/CVE-2017-3731"},{"reference_url":"https://source.android.com/security/bulletin/pixel/2017-11-01","reference_id":"","reference_type":"","scores":[],"url":"https://source.android.com/security/bulletin/pixel/2017-11-01"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"},{"reference_url":"https://www.openssl.org/news/secadv/20170126.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openssl.org/news/secadv/20170126.txt"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.tenable.com/security/tns-2017-04","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-04"},{"reference_url":"http://www.debian.org/security/2017/dsa-3773","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2017/dsa-3773"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/95813","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/95813"},{"reference_url":"http://www.securitytracker.com/id/1037717","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1416852","reference_id":"1416852","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1416852"},{"reference_url":"https://security.archlinux.org/ASA-201701-36","reference_id":"ASA-201701-36","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-36"},{"reference_url":"https://security.archlinux.org/ASA-201701-37","reference_id":"ASA-201701-37","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-37"},{"reference_url":"https://security.archlinux.org/AVG-154","reference_id":"AVG-154","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-154"},{"reference_url":"https://security.archlinux.org/AVG-155","reference_id":"AVG-155","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-155"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3731","reference_id":"CVE-2017-3731","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3731"},{"reference_url":"https://security.gentoo.org/glsa/201702-07","reference_id":"GLSA-201702-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0286","reference_id":"RHSA-2017:0286","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0286"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3181-1/","reference_id":"USN-3181-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3181-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3731"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4qqa-zm88-w7ca"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/3763?format=json","vulnerability_id":"VCID-8gcm-7q3n-q7bm","summary":"Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4975.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4975.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4975","reference_id":"","reference_type":"","scores":[{"value":"0.73272","scoring_system":"epss","scoring_elements":"0.98788","published_at":"2026-04-09T12:55:00Z"},{"value":"0.73272","scoring_system":"epss","scoring_elements":"0.98789","published_at":"2026-04-08T12:55:00Z"},{"value":"0.73272","scoring_system":"epss","scoring_elements":"0.98791","published_at":"2026-04-11T12:55:00Z"},{"value":"0.73272","scoring_system":"epss","scoring_elements":"0.98793","published_at":"2026-04-13T12:55:00Z"},{"value":"0.73272","scoring_system":"epss","scoring_elements":"0.98792","published_at":"2026-04-12T12:55:00Z"},{"value":"0.75341","scoring_system":"epss","scoring_elements":"0.9888","published_at":"2026-04-04T12:55:00Z"},{"value":"0.75341","scoring_system":"epss","scoring_elements":"0.98876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.75341","scoring_system":"epss","scoring_elements":"0.98878","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4975"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4975"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375968","reference_id":"1375968","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1375968"},{"reference_url":"https://httpd.apache.org/security/json/CVE-2016-4975.json","reference_id":"CVE-2016-4975","reference_type":"","scores":[{"value":"moderate","scoring_system":"apache_httpd","scoring_elements":""}],"url":"https://httpd.apache.org/security/json/CVE-2016-4975.json"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0906","reference_id":"RHSA-2017:0906","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0906"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"}],"fixed_packages":[],"aliases":["CVE-2016-4975"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8gcm-7q3n-q7bm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34243?format=json","vulnerability_id":"VCID-b253-fb1w-yfcn","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which might allow attackers to access sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7055.json","reference_id":"","reference_type":"","scores":[{"value":"3.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7055.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7055","reference_id":"","reference_type":"","scores":[{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87811","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87867","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87822","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87833","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87836","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87857","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87875","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0365","scoring_system":"epss","scoring_elements":"0.87868","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-7055"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03752en_us"},{"reference_url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03744en_us"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"},{"reference_url":"https://www.openssl.org/news/secadv/20161110.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openssl.org/news/secadv/20161110.txt"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.tenable.com/security/tns-2017-04","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-04"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/94242","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/94242"},{"reference_url":"http://www.securitytracker.com/id/1037261","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037261"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1393929","reference_id":"1393929","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1393929"},{"reference_url":"https://security.archlinux.org/ASA-201701-36","reference_id":"ASA-201701-36","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-36"},{"reference_url":"https://security.archlinux.org/ASA-201701-37","reference_id":"ASA-201701-37","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-37"},{"reference_url":"https://security.archlinux.org/AVG-154","reference_id":"AVG-154","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-154"},{"reference_url":"https://security.archlinux.org/AVG-155","reference_id":"AVG-155","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-155"},{"reference_url":"https://security.archlinux.org/AVG-67","reference_id":"AVG-67","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-67"},{"reference_url":"https://security.archlinux.org/AVG-68","reference_id":"AVG-68","reference_type":"","scores":[{"value":"Low","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-68"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7055","reference_id":"CVE-2016-7055","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-7055"},{"reference_url":"https://security.gentoo.org/glsa/201702-07","reference_id":"GLSA-201702-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-07"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3181-1/","reference_id":"USN-3181-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3181-1/"}],"fixed_packages":[],"aliases":["CVE-2016-7055"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b253-fb1w-yfcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50373?format=json","vulnerability_id":"VCID-baa9-1j6z-4yfr","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which may lead to a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3737.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3737.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3737","reference_id":"","reference_type":"","scores":[{"value":"0.42931","scoring_system":"epss","scoring_elements":"0.9746","published_at":"2026-04-01T12:55:00Z"},{"value":"0.42931","scoring_system":"epss","scoring_elements":"0.97484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.42931","scoring_system":"epss","scoring_elements":"0.97466","published_at":"2026-04-02T12:55:00Z"},{"value":"0.42931","scoring_system":"epss","scoring_elements":"0.97471","published_at":"2026-04-07T12:55:00Z"},{"value":"0.42931","scoring_system":"epss","scoring_elements":"0.97477","published_at":"2026-04-08T12:55:00Z"},{"value":"0.42931","scoring_system":"epss","scoring_elements":"0.97478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.42931","scoring_system":"epss","scoring_elements":"0.97481","published_at":"2026-04-11T12:55:00Z"},{"value":"0.42931","scoring_system":"epss","scoring_elements":"0.97483","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3737"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-179516.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/openssl/openssl/commit/898fb884b706aaeb283de4812340bb0bde8476dc","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/openssl/openssl/commit/898fb884b706aaeb283de4812340bb0bde8476dc"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171208-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20171208-0001/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180117-0002/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180419-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180419-0002/"},{"reference_url":"https://www.debian.org/security/2017/dsa-4065","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4065"},{"reference_url":"https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/","reference_id":"","reference_type":"","scores":[],"url":"https://www.digitalmunition.me/2017/12/cve-2017-3737-openssl-security-bypass-vulnerability/"},{"reference_url":"https://www.openssl.org/news/secadv/20171207.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openssl.org/news/secadv/20171207.txt"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://www.tenable.com/security/tns-2017-16","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-16"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.securityfocus.com/bid/102103","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102103"},{"reference_url":"http://www.securitytracker.com/id/1039978","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039978"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1523504","reference_id":"1523504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1523504"},{"reference_url":"https://security.archlinux.org/AVG-548","reference_id":"AVG-548","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-548"},{"reference_url":"https://security.archlinux.org/AVG-549","reference_id":"AVG-549","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-549"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3737","reference_id":"CVE-2017-3737","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3737"},{"reference_url":"https://security.gentoo.org/glsa/201712-03","reference_id":"GLSA-201712-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201712-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0998","reference_id":"RHSA-2018:0998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3512-1/","reference_id":"USN-3512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3512-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3737"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-baa9-1j6z-4yfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81512?format=json","vulnerability_id":"VCID-e15t-7nz1-8yhq","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6302.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6302.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6302","reference_id":"","reference_type":"","scores":[{"value":"0.09161","scoring_system":"epss","scoring_elements":"0.92662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09161","scoring_system":"epss","scoring_elements":"0.92655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.9321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93194","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93201","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369855","reference_id":"1369855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369855"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[],"aliases":["CVE-2016-6302"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e15t-7nz1-8yhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62399?format=json","vulnerability_id":"VCID-fakv-qsaf-vyfp","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which allows attackers to conduct a time based side-channel attack.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6306.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6306.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6306","reference_id":"","reference_type":"","scores":[{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92167","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92149","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92152","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377594","reference_id":"1377594","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377594"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://security.gentoo.org/glsa/201612-16","reference_id":"GLSA-201612-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[],"aliases":["CVE-2016-6306"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fakv-qsaf-vyfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50372?format=json","vulnerability_id":"VCID-q78j-864j-pkbq","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which may lead to a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3736.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3736.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3736","reference_id":"","reference_type":"","scores":[{"value":"0.07129","scoring_system":"epss","scoring_elements":"0.91544","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07129","scoring_system":"epss","scoring_elements":"0.91534","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07129","scoring_system":"epss","scoring_elements":"0.9154","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07129","scoring_system":"epss","scoring_elements":"0.91545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07129","scoring_system":"epss","scoring_elements":"0.91546","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08849","scoring_system":"epss","scoring_elements":"0.92509","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08849","scoring_system":"epss","scoring_elements":"0.92514","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08849","scoring_system":"epss","scoring_elements":"0.92521","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08849","scoring_system":"epss","scoring_elements":"0.92523","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3736"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:C/A:N"},{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/openssl/openssl/commit/4443cf7aa0099e5ce615c18cee249fff77fb0871"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:11.openssl.asc"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171107-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20171107-0002/"},{"reference_url":"https://security.netapp.com/advisory/ntap-20180117-0002/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20180117-0002/"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us"},{"reference_url":"https://www.debian.org/security/2017/dsa-4017","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4017"},{"reference_url":"https://www.debian.org/security/2017/dsa-4018","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4018"},{"reference_url":"https://www.openssl.org/news/secadv/20171102.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openssl.org/news/secadv/20171102.txt"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://www.tenable.com/security/tns-2017-14","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-14"},{"reference_url":"https://www.tenable.com/security/tns-2017-15","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-15"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/101666","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/101666"},{"reference_url":"http://www.securitytracker.com/id/1039727","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039727"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509169","reference_id":"1509169","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1509169"},{"reference_url":"https://security.archlinux.org/ASA-201711-14","reference_id":"ASA-201711-14","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-14"},{"reference_url":"https://security.archlinux.org/ASA-201711-15","reference_id":"ASA-201711-15","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201711-15"},{"reference_url":"https://security.archlinux.org/AVG-477","reference_id":"AVG-477","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-477"},{"reference_url":"https://security.archlinux.org/AVG-478","reference_id":"AVG-478","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-478"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3736","reference_id":"CVE-2017-3736","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:S/C:P/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3736"},{"reference_url":"https://security.gentoo.org/glsa/201712-03","reference_id":"GLSA-201712-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201712-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0998","reference_id":"RHSA-2018:0998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2568","reference_id":"RHSA-2018:2568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2575","reference_id":"RHSA-2018:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2713","reference_id":"RHSA-2018:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2713"},{"reference_url":"https://usn.ubuntu.com/3475-1/","reference_id":"USN-3475-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3475-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3736"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q78j-864j-pkbq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81511?format=json","vulnerability_id":"VCID-xbme-7ph4-p3bz","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2182.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2182","reference_id":"","reference_type":"","scores":[{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1367340","reference_id":"1367340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1367340"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[],"aliases":["CVE-2016-2182"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xbme-7ph4-p3bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34250?format=json","vulnerability_id":"VCID-xbzp-nuch-h3hq","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which might allow attackers to access sensitive information.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3732.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3732.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3732","reference_id":"","reference_type":"","scores":[{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89931","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.8994","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05205","scoring_system":"epss","scoring_elements":"0.89938","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07535","scoring_system":"epss","scoring_elements":"0.91774","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07535","scoring_system":"epss","scoring_elements":"0.91783","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07535","scoring_system":"epss","scoring_elements":"0.91789","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07535","scoring_system":"epss","scoring_elements":"0.91797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07535","scoring_system":"epss","scoring_elements":"0.9181","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3732"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03838en_us"},{"reference_url":"https://www.openssl.org/news/secadv/20170126.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openssl.org/news/secadv/20170126.txt"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.tenable.com/security/tns-2017-04","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-04"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.securityfocus.com/bid/95814","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/95814"},{"reference_url":"http://www.securitytracker.com/id/1037717","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1037717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1416856","reference_id":"1416856","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1416856"},{"reference_url":"https://security.archlinux.org/ASA-201701-36","reference_id":"ASA-201701-36","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-36"},{"reference_url":"https://security.archlinux.org/ASA-201701-37","reference_id":"ASA-201701-37","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201701-37"},{"reference_url":"https://security.archlinux.org/AVG-154","reference_id":"AVG-154","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-154"},{"reference_url":"https://security.archlinux.org/AVG-155","reference_id":"AVG-155","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-155"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3732","reference_id":"CVE-2017-3732","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3732"},{"reference_url":"https://security.gentoo.org/glsa/201702-07","reference_id":"GLSA-201702-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201702-07"},{"reference_url":"https://security.gentoo.org/glsa/201802-04","reference_id":"GLSA-201802-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201802-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2568","reference_id":"RHSA-2018:2568","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2568"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2575","reference_id":"RHSA-2018:2575","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2575"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2713","reference_id":"RHSA-2018:2713","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2713"},{"reference_url":"https://usn.ubuntu.com/3181-1/","reference_id":"USN-3181-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3181-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3732"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xbzp-nuch-h3hq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50374?format=json","vulnerability_id":"VCID-yfky-n79d-cff2","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which may lead to a Denial of Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3738.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-3738.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3738","reference_id":"","reference_type":"","scores":[{"value":"0.1413","scoring_system":"epss","scoring_elements":"0.94356","published_at":"2026-04-08T12:55:00Z"},{"value":"0.15507","scoring_system":"epss","scoring_elements":"0.94669","published_at":"2026-04-13T12:55:00Z"},{"value":"0.15507","scoring_system":"epss","scoring_elements":"0.94661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.15507","scoring_system":"epss","scoring_elements":"0.94665","published_at":"2026-04-11T12:55:00Z"},{"value":"0.15507","scoring_system":"epss","scoring_elements":"0.94668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.17287","scoring_system":"epss","scoring_elements":"0.95004","published_at":"2026-04-01T12:55:00Z"},{"value":"0.17287","scoring_system":"epss","scoring_elements":"0.95015","published_at":"2026-04-02T12:55:00Z"},{"value":"0.17287","scoring_system":"epss","scoring_elements":"0.95016","published_at":"2026-04-04T12:55:00Z"},{"value":"0.17287","scoring_system":"epss","scoring_elements":"0.95019","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-3738"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:C/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/openssl/openssl/commit/e502cc86df9dafded1694fceb3228ee34d11c11a"},{"reference_url":"https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/","reference_id":"","reference_type":"","scores":[],"url":"https://nodejs.org/en/blog/vulnerability/december-2017-security-releases/"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:12.openssl.asc"},{"reference_url":"https://security.netapp.com/advisory/ntap-20171208-0001/","reference_id":"","reference_type":"","scores":[],"url":"https://security.netapp.com/advisory/ntap-20171208-0001/"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03881en_us"},{"reference_url":"https://www.debian.org/security/2017/dsa-4065","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2017/dsa-4065"},{"reference_url":"https://www.debian.org/security/2018/dsa-4157","reference_id":"","reference_type":"","scores":[],"url":"https://www.debian.org/security/2018/dsa-4157"},{"reference_url":"https://www.openssl.org/news/secadv/20171207.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openssl.org/news/secadv/20171207.txt"},{"reference_url":"https://www.openssl.org/news/secadv/20180327.txt","reference_id":"","reference_type":"","scores":[],"url":"https://www.openssl.org/news/secadv/20180327.txt"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"reference_url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html","reference_id":"","reference_type":"","scores":[],"url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"reference_url":"https://www.tenable.com/security/tns-2017-16","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2017-16"},{"reference_url":"https://www.tenable.com/security/tns-2018-04","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2018-04"},{"reference_url":"https://www.tenable.com/security/tns-2018-06","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2018-06"},{"reference_url":"https://www.tenable.com/security/tns-2018-07","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2018-07"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"},{"reference_url":"http://www.securityfocus.com/bid/102118","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/102118"},{"reference_url":"http://www.securitytracker.com/id/1039978","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1039978"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1523510","reference_id":"1523510","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1523510"},{"reference_url":"https://security.archlinux.org/ASA-201804-2","reference_id":"ASA-201804-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201804-2"},{"reference_url":"https://security.archlinux.org/ASA-201804-6","reference_id":"ASA-201804-6","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201804-6"},{"reference_url":"https://security.archlinux.org/AVG-540","reference_id":"AVG-540","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-540"},{"reference_url":"https://security.archlinux.org/AVG-551","reference_id":"AVG-551","reference_type":"","scores":[{"value":"Medium","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-551"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2l:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2m:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.1.0g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.1.0g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3738","reference_id":"CVE-2017-3738","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-3738"},{"reference_url":"https://security.gentoo.org/glsa/201712-03","reference_id":"GLSA-201712-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201712-03"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:0998","reference_id":"RHSA-2018:0998","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:0998"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3512-1/","reference_id":"USN-3512-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3512-1/"}],"fixed_packages":[],"aliases":["CVE-2017-3738"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yfky-n79d-cff2"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-23.GA.jbcs%3Farch=el7"}