Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/371545?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/371545?format=api", "purl": "pkg:alpm/archlinux/openvpn@2.4.2-1", "type": "alpm", "namespace": "archlinux", "name": "openvpn", "version": "2.4.2-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.4.3-1", "latest_non_vulnerable_version": "2.5.2-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84206?format=api", "vulnerability_id": "VCID-98sq-tcbt-fbde", "summary": "AMP: validation bypass in oauth", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7512.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7512.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7512", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65786", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65831", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65883", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65913", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.659", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.6587", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65906", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.6592", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65909", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65919", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.6593", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65928", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65903", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65949", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00498", "scoring_system": "epss", "scoring_elements": "0.65993", "published_at": "2026-05-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7512" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1457997", "reference_id": "1457997", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1457997" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371546?format=api", "purl": "pkg:alpm/archlinux/openvpn@2.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvpn@2.4.3-1" } ], "aliases": [ "CVE-2017-7512" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98sq-tcbt-fbde" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72538?format=api", "vulnerability_id": "VCID-n8nh-wf64-8fgr", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7508.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7508.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58541", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58701", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58631", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58599", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58643", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58625", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58646", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58613", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58665", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58671", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.5865", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58683", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58687", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58663", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00367", "scoring_system": "epss", "scoring_elements": "0.58632", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:H/Au:N/C:N/I:N/A:C" }, { "value": "5.9", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371546?format=api", "purl": "pkg:alpm/archlinux/openvpn@2.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvpn@2.4.3-1" } ], "aliases": [ "CVE-2017-7508" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n8nh-wf64-8fgr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/84232?format=api", "vulnerability_id": "VCID-rkee-udq8-afg2", "summary": "openvpn: Multiple security issues fixed in OpenVPN 2.4.3 and 2.3.17", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7522.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7522.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7522", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66796", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66985", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66934", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66904", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66947", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66835", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.6686", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66832", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66895", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66915", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66869", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66916", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66899", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66923", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66937", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7522" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7522", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7522" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:S/C:N/I:N/A:C" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://security.archlinux.org/AVG-319", "reference_id": "AVG-319", "reference_type": "", "scores": [ { "value": "Medium", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-319" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371546?format=api", "purl": "pkg:alpm/archlinux/openvpn@2.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvpn@2.4.3-1" } ], "aliases": [ "CVE-2017-7522" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rkee-udq8-afg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72542?format=api", "vulnerability_id": "VCID-vucu-2pfy-93ds", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7521.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7521.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00178", "scoring_system": "epss", "scoring_elements": "0.38967", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.4223", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42305", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42453", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00204", "scoring_system": "epss", "scoring_elements": "0.42369", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63539", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63557", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63573", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63523", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63559", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63567", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63551", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.6357", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63437", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63497", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00447", "scoring_system": "epss", "scoring_elements": "0.63488", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7521" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371546?format=api", "purl": "pkg:alpm/archlinux/openvpn@2.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvpn@2.4.3-1" } ], "aliases": [ "CVE-2017-7521" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vucu-2pfy-93ds" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72540?format=api", "vulnerability_id": "VCID-zuyu-zw1g-uqg7", "summary": "security update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7520.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7520.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54807", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54786", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54764", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.5471", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.00317", "scoring_system": "epss", "scoring_elements": "0.54752", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7539", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75402", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75446", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75455", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75474", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75453", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75442", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75485", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7549", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.7548", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75513", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75387", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00886", "scoring_system": "epss", "scoring_elements": "0.75422", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7520" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7521" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:C" }, { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642", "reference_id": "1463642", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1463642" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480", "reference_id": "865480", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=865480" }, { "reference_url": "https://security.archlinux.org/ASA-201706-27", "reference_id": "ASA-201706-27", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201706-27" }, { "reference_url": "https://security.archlinux.org/AVG-318", "reference_id": "AVG-318", "reference_type": "", "scores": [ { "value": "Critical", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-318" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" }, { "reference_url": "https://usn.ubuntu.com/3339-2/", "reference_id": "USN-3339-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-2/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371546?format=api", "purl": "pkg:alpm/archlinux/openvpn@2.4.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvpn@2.4.3-1" } ], "aliases": [ "CVE-2017-7520" ], "risk_score": 4.5, "exploitability": "0.5", "weighted_severity": "9.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zuyu-zw1g-uqg7" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93318?format=api", "vulnerability_id": "VCID-crrt-th9e-z3ay", "summary": "OpenVPN versions before 2.3.15 and before 2.4.2 are vulnerable to reachable assertion when packet-ID counter rolls over resulting into Denial of Service of server by authenticated attacker.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.59031", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58859", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58933", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58956", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58922", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58974", "published_at": "2026-05-07T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.5898", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58999", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58962", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58996", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58979", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58961", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58977", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58965", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00372", "scoring_system": "epss", "scoring_elements": "0.58925", "published_at": "2026-05-05T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7479" }, { "reference_url": "https://security.archlinux.org/ASA-201705-16", "reference_id": "ASA-201705-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-16" }, { "reference_url": "https://security.archlinux.org/AVG-271", "reference_id": "AVG-271", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-271" }, { "reference_url": "https://usn.ubuntu.com/3284-1/", "reference_id": "USN-3284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3284-1/" }, { "reference_url": "https://usn.ubuntu.com/3339-1/", "reference_id": "USN-3339-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3339-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371545?format=api", "purl": "pkg:alpm/archlinux/openvpn@2.4.2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-98sq-tcbt-fbde" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvpn@2.4.2-1" } ], "aliases": [ "CVE-2017-7479" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-crrt-th9e-z3ay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/93317?format=api", "vulnerability_id": "VCID-wk2j-j9y1-5yhp", "summary": "OpenVPN version 2.3.12 and newer is vulnerable to unauthenticated Denial of Service of server via received large control packet. Note that this issue is fixed in 2.3.15 and 2.4.2.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7478", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89319", "published_at": "2026-05-09T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89199", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89204", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89219", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89221", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89239", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89244", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89253", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89249", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89246", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89259", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89254", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89271", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89277", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89281", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89289", "published_at": "2026-05-05T12:55:00Z" }, { "value": "0.04599", "scoring_system": "epss", "scoring_elements": "0.89308", "published_at": "2026-05-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-7478" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7478" }, { "reference_url": "https://security.archlinux.org/ASA-201705-16", "reference_id": "ASA-201705-16", "reference_type": "", "scores": [], "url": "https://security.archlinux.org/ASA-201705-16" }, { "reference_url": "https://security.archlinux.org/AVG-271", "reference_id": "AVG-271", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-271" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41993.py", "reference_id": "CVE-2017-7478", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/dos/41993.py" }, { "reference_url": "https://ostif.org/the-openvpn-2-4-0-audit-by-ostif-and-quarkslab-results/", "reference_id": "CVE-2017-7478", "reference_type": "exploit", "scores": [], "url": "https://ostif.org/the-openvpn-2-4-0-audit-by-ostif-and-quarkslab-results/" }, { "reference_url": "https://usn.ubuntu.com/3284-1/", "reference_id": "USN-3284-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/3284-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/371545?format=api", "purl": "pkg:alpm/archlinux/openvpn@2.4.2-1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-98sq-tcbt-fbde" }, { "vulnerability": "VCID-n8nh-wf64-8fgr" }, { "vulnerability": "VCID-rkee-udq8-afg2" }, { "vulnerability": "VCID-vucu-2pfy-93ds" }, { "vulnerability": "VCID-zuyu-zw1g-uqg7" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvpn@2.4.2-1" } ], "aliases": [ "CVE-2017-7478" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wk2j-j9y1-5yhp" } ], "risk_score": "4.5", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/openvpn@2.4.2-1" }