{"url":"http://public2.vulnerablecode.io/api/packages/373166?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.h-1","type":"alpm","namespace":"archlinux","name":"lib32-openssl","version":"1:1.0.2.h-1","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1:1.0.2.k-1","latest_non_vulnerable_version":"1:3.1.4-1","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81510?format=json","vulnerability_id":"VCID-5bpy-8k6q-5uh9","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2181.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2181.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2181","reference_id":"","reference_type":"","scores":[{"value":"0.23026","scoring_system":"epss","scoring_elements":"0.95876","published_at":"2026-04-01T12:55:00Z"},{"value":"0.23026","scoring_system":"epss","scoring_elements":"0.95913","published_at":"2026-04-13T12:55:00Z"},{"value":"0.23026","scoring_system":"epss","scoring_elements":"0.95905","published_at":"2026-04-08T12:55:00Z"},{"value":"0.23026","scoring_system":"epss","scoring_elements":"0.95908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.23026","scoring_system":"epss","scoring_elements":"0.95911","published_at":"2026-04-12T12:55:00Z"},{"value":"0.23026","scoring_system":"epss","scoring_elements":"0.95884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.23026","scoring_system":"epss","scoring_elements":"0.95893","published_at":"2026-04-04T12:55:00Z"},{"value":"0.23026","scoring_system":"epss","scoring_elements":"0.95896","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369113","reference_id":"1369113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369113"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-2181"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5bpy-8k6q-5uh9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81512?format=json","vulnerability_id":"VCID-e15t-7nz1-8yhq","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6302.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6302.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6302","reference_id":"","reference_type":"","scores":[{"value":"0.09161","scoring_system":"epss","scoring_elements":"0.92662","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09161","scoring_system":"epss","scoring_elements":"0.92655","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93209","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.9321","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93207","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93194","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93192","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10383","scoring_system":"epss","scoring_elements":"0.93201","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369855","reference_id":"1369855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369855"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-6302"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e15t-7nz1-8yhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62399?format=json","vulnerability_id":"VCID-fakv-qsaf-vyfp","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which allows attackers to conduct a time based side-channel attack.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6306.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6306.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6306","reference_id":"","reference_type":"","scores":[{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92168","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92164","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92167","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92149","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08131","scoring_system":"epss","scoring_elements":"0.92152","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6306"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377594","reference_id":"1377594","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377594"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://security.gentoo.org/glsa/201612-16","reference_id":"GLSA-201612-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-6306"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fakv-qsaf-vyfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62395?format=json","vulnerability_id":"VCID-fbj8-csfj-ayec","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which allows attackers to conduct a time based side-channel attack.","references":[{"reference_url":"http://eprint.iacr.org/2016/594.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://eprint.iacr.org/2016/594.pdf"},{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00013.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00021.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1940.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1940.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2957.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2957.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-1659.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-1659.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2178.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2178.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2178","reference_id":"","reference_type":"","scores":[{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40905","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00191","scoring_system":"epss","scoring_elements":"0.40986","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45102","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45058","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45111","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.4511","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45133","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45101","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00224","scoring_system":"epss","scoring_elements":"0.45116","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2178"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa132","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa132"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"http://seclists.org/fulldisclosure/2017/Jul/31","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2017/Jul/31"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.2","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=399944622df7bd81af62e67ea967c470534090e2","reference_id":"","reference_type":"","scores":[],"url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=399944622df7bd81af62e67ea967c470534090e2"},{"reference_url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"},{"reference_url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312","reference_id":"","reference_type":"","scores":[],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10215","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10215"},{"reference_url":"https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/","reference_id":"","reference_type":"","scores":[],"url":"https://nodejs.org/en/blog/vulnerability/september-2016-security-releases/"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"},{"reference_url":"https://support.f5.com/csp/article/K53084033","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K53084033"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"},{"reference_url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24","reference_id":"","reference_type":"","scores":[],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"},{"reference_url":"https://www.tenable.com/security/tns-2016-16","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-16"},{"reference_url":"https://www.tenable.com/security/tns-2016-20","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-20"},{"reference_url":"https://www.tenable.com/security/tns-2016-21","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-21"},{"reference_url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl","reference_id":"","reference_type":"","scores":[],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039"},{"reference_url":"http://www.debian.org/security/2016/dsa-3673","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3673"},{"reference_url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en","reference_id":"","reference_type":"","scores":[],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/10","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/10"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/11","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/11"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/12","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/12"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/4","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/4"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/5","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/5"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/7","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/7"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/8"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/09/2","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/09/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/09/8","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/09/8"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"},{"reference_url":"http://www.securityfocus.com/bid/91081","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91081"},{"reference_url":"http://www.securitytracker.com/id/1036054","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036054"},{"reference_url":"http://www.splunk.com/view/SP-CAAAPSV","reference_id":"","reference_type":"","scores":[],"url":"http://www.splunk.com/view/SP-CAAAPSV"},{"reference_url":"http://www.splunk.com/view/SP-CAAAPUE","reference_id":"","reference_type":"","scores":[],"url":"http://www.splunk.com/view/SP-CAAAPUE"},{"reference_url":"http://www.ubuntu.com/usn/USN-3087-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3087-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3087-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3087-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1343400","reference_id":"1343400","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1343400"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2178","reference_id":"CVE-2016-2178","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"},{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2178"},{"reference_url":"https://security.gentoo.org/glsa/201612-16","reference_id":"GLSA-201612-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0193","reference_id":"RHSA-2017:0193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0194","reference_id":"RHSA-2017:0194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1658","reference_id":"RHSA-2017:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1659","reference_id":"RHSA-2017:1659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1659"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-2178"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fbj8-csfj-ayec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81513?format=json","vulnerability_id":"VCID-m191-295u-tba7","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6303.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6303.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6303","reference_id":"","reference_type":"","scores":[{"value":"0.28004","scoring_system":"epss","scoring_elements":"0.96436","published_at":"2026-04-01T12:55:00Z"},{"value":"0.28004","scoring_system":"epss","scoring_elements":"0.96448","published_at":"2026-04-04T12:55:00Z"},{"value":"0.28004","scoring_system":"epss","scoring_elements":"0.96444","published_at":"2026-04-02T12:55:00Z"},{"value":"0.28004","scoring_system":"epss","scoring_elements":"0.96453","published_at":"2026-04-07T12:55:00Z"},{"value":"0.28004","scoring_system":"epss","scoring_elements":"0.96461","published_at":"2026-04-08T12:55:00Z"},{"value":"0.28004","scoring_system":"epss","scoring_elements":"0.96464","published_at":"2026-04-09T12:55:00Z"},{"value":"0.28821","scoring_system":"epss","scoring_elements":"0.96555","published_at":"2026-04-13T12:55:00Z"},{"value":"0.28821","scoring_system":"epss","scoring_elements":"0.96552","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.5","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1370146","reference_id":"1370146","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1370146"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-6303"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m191-295u-tba7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62397?format=json","vulnerability_id":"VCID-nsjj-szaq-1kgd","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which allows attackers to conduct a time based side-channel attack.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6304.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6304.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6304","reference_id":"","reference_type":"","scores":[{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95133","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95169","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95159","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95165","published_at":"2026-04-11T12:55:00Z"},{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95166","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95144","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95145","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95148","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18043","scoring_system":"epss","scoring_elements":"0.95155","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377600","reference_id":"1377600","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1377600"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://security.gentoo.org/glsa/201612-16","reference_id":"GLSA-201612-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2802","reference_id":"RHSA-2016:2802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1413","reference_id":"RHSA-2017:1413","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1413"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1414","reference_id":"RHSA-2017:1414","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1414"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1415","reference_id":"RHSA-2017:1415","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1415"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1658","reference_id":"RHSA-2017:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1659","reference_id":"RHSA-2017:1659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1659"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-6304"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nsjj-szaq-1kgd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62394?format=json","vulnerability_id":"VCID-r616-sqha-pudt","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which allows attackers to conduct a time based side-channel attack.","references":[{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00022.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00023.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00024.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00031.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00005.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00012.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00029.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2017-10/msg00011.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-02/msg00032.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1940.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1940.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-2957.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-2957.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2017-1659.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2017-1659.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2177.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2177.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2177","reference_id":"","reference_type":"","scores":[{"value":"0.29058","scoring_system":"epss","scoring_elements":"0.96544","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29058","scoring_system":"epss","scoring_elements":"0.96578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29058","scoring_system":"epss","scoring_elements":"0.96553","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29058","scoring_system":"epss","scoring_elements":"0.96559","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29058","scoring_system":"epss","scoring_elements":"0.96562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29058","scoring_system":"epss","scoring_elements":"0.9657","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29058","scoring_system":"epss","scoring_elements":"0.96572","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29058","scoring_system":"epss","scoring_elements":"0.96575","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2177"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa132","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa132"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"http://seclists.org/fulldisclosure/2017/Jul/31","reference_id":"","reference_type":"","scores":[],"url":"http://seclists.org/fulldisclosure/2017/Jul/31"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:P/A:P"},{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=a004e72b95835136d3f1ea90517f706c24c03da7","reference_id":"","reference_type":"","scores":[],"url":"https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=a004e72b95835136d3f1ea90517f706c24c03da7"},{"reference_url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05302448"},{"reference_url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03763en_us"},{"reference_url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05302448"},{"reference_url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01","reference_id":"","reference_type":"","scores":[],"url":"https://ics-cert.us-cert.gov/advisories/ICSA-18-144-01"},{"reference_url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312","reference_id":"","reference_type":"","scores":[],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10165","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10165"},{"reference_url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10215","reference_id":"","reference_type":"","scores":[],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10215"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"},{"reference_url":"https://support.f5.com/csp/article/K23873366","reference_id":"","reference_type":"","scores":[],"url":"https://support.f5.com/csp/article/K23873366"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en&docId=emr_na-hpesbhf03856en_us"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"},{"reference_url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24","reference_id":"","reference_type":"","scores":[],"url":"https://www.arista.com/en/support/advisories-notices/security-advisories/1749-security-advisory-24"},{"reference_url":"https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager","reference_id":"","reference_type":"","scores":[],"url":"https://www.citect.schneider-electric.com/safety-and-security-central/36-security-notifications/9134-vulnerabilities-within-schneider-electric-floating-license-manager"},{"reference_url":"https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/","reference_id":"","reference_type":"","scores":[],"url":"https://www.schneider-electric.com/en/download/document/SEVD-2018-137-01/"},{"reference_url":"https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/","reference_id":"","reference_type":"","scores":[],"url":"https://www.schneider-electric.com/en/download/document/SEVD-2018-144-01/"},{"reference_url":"https://www.tenable.com/security/tns-2016-16","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-16"},{"reference_url":"https://www.tenable.com/security/tns-2016-20","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-20"},{"reference_url":"https://www.tenable.com/security/tns-2016-21","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-21"},{"reference_url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl","reference_id":"","reference_type":"","scores":[],"url":"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160927-openssl"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039"},{"reference_url":"http://www.debian.org/security/2016/dsa-3673","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3673"},{"reference_url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en","reference_id":"","reference_type":"","scores":[],"url":"http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20170322-01-openssl-en"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/06/08/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/06/08/9"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"},{"reference_url":"http://www.securityfocus.com/archive/1/540957/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/540957/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/archive/1/540957/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/91319","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/91319"},{"reference_url":"http://www.securitytracker.com/id/1036088","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036088"},{"reference_url":"http://www.splunk.com/view/SP-CAAAPSV","reference_id":"","reference_type":"","scores":[],"url":"http://www.splunk.com/view/SP-CAAAPSV"},{"reference_url":"http://www.splunk.com/view/SP-CAAAPUE","reference_id":"","reference_type":"","scores":[],"url":"http://www.splunk.com/view/SP-CAAAPUE"},{"reference_url":"http://www.ubuntu.com/usn/USN-3087-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3087-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-3087-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3087-2"},{"reference_url":"http://www.ubuntu.com/usn/USN-3181-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-3181-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1341705","reference_id":"1341705","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1341705"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_mcrp:3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:icewall_mcrp:3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_mcrp:3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:certd:*:*:*","reference_id":"cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:certd:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:certd:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:dfw:*:*:*","reference_id":"cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:dfw:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_sso:10.0:*:*:*:dfw:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2177","reference_id":"CVE-2016-2177","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:P/I:P/A:P"},{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2177"},{"reference_url":"https://security.gentoo.org/glsa/201612-16","reference_id":"GLSA-201612-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:2957","reference_id":"RHSA-2016:2957","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:2957"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0193","reference_id":"RHSA-2017:0193","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0194","reference_id":"RHSA-2017:0194","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0194"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1658","reference_id":"RHSA-2017:1658","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1658"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1659","reference_id":"RHSA-2017:1659","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1659"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"},{"reference_url":"https://usn.ubuntu.com/3181-1/","reference_id":"USN-3181-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3181-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-2177"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r616-sqha-pudt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62396?format=json","vulnerability_id":"VCID-rrtk-cq5p-fkdg","summary":"Multiple vulnerabilities have been found in OpenSSL, the worst of\n    which allows attackers to conduct a time based side-channel attack.","references":[{"reference_url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759","reference_id":"","reference_type":"","scores":[],"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2016-1940.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2016-1940.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2180.json","reference_id":"","reference_type":"","scores":[{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2180.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2180","reference_id":"","reference_type":"","scores":[{"value":"0.042","scoring_system":"epss","scoring_elements":"0.88733","published_at":"2026-04-13T12:55:00Z"},{"value":"0.042","scoring_system":"epss","scoring_elements":"0.88738","published_at":"2026-04-11T12:55:00Z"},{"value":"0.042","scoring_system":"epss","scoring_elements":"0.88732","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04621","scoring_system":"epss","scoring_elements":"0.89266","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04621","scoring_system":"epss","scoring_elements":"0.89262","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04621","scoring_system":"epss","scoring_elements":"0.89221","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04621","scoring_system":"epss","scoring_elements":"0.89227","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04621","scoring_system":"epss","scoring_elements":"0.89241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04621","scoring_system":"epss","scoring_elements":"0.89244","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2180"},{"reference_url":"https://bto.bluecoat.com/security-advisory/sa132","reference_id":"","reference_type":"","scores":[],"url":"https://bto.bluecoat.com/security-advisory/sa132"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/openssl/openssl/commit/0ed26acce328ec16a3aa635f1ca37365e8c7403a"},{"reference_url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312","reference_id":"","reference_type":"","scores":[],"url":"https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40312"},{"reference_url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc","reference_id":"","reference_type":"","scores":[],"url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-16:26.openssl.asc"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03856en_us"},{"reference_url":"https://www.tenable.com/security/tns-2016-16","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-16"},{"reference_url":"https://www.tenable.com/security/tns-2016-20","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-20"},{"reference_url":"https://www.tenable.com/security/tns-2016-21","reference_id":"","reference_type":"","scores":[],"url":"https://www.tenable.com/security/tns-2016-21"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21995039"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"reference_url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html"},{"reference_url":"http://www.securityfocus.com/bid/92117","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/92117"},{"reference_url":"http://www.securitytracker.com/id/1036486","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1036486"},{"reference_url":"http://www.splunk.com/view/SP-CAAAPSV","reference_id":"","reference_type":"","scores":[],"url":"http://www.splunk.com/view/SP-CAAAPSV"},{"reference_url":"http://www.splunk.com/view/SP-CAAAPUE","reference_id":"","reference_type":"","scores":[],"url":"http://www.splunk.com/view/SP-CAAAPUE"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359615","reference_id":"1359615","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1359615"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1j:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1k:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1l:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1m:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1n:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1o:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1p:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1q:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1r:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1s:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1t:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2g:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2180","reference_id":"CVE-2016-2180","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"},{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-2180"},{"reference_url":"https://security.gentoo.org/glsa/201612-16","reference_id":"GLSA-201612-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-16"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-2180"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rrtk-cq5p-fkdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/37005?format=json","vulnerability_id":"VCID-x54g-mhs4-mug4","summary":"Multiple vulnerabilities have been found in Oracle's JRE and JDK\n    software suites, the worst of which may allow execution of arbitrary code","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2183.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2183","reference_id":"","reference_type":"","scores":[{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97356","published_at":"2026-04-01T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97378","published_at":"2026-04-13T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97374","published_at":"2026-04-08T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97375","published_at":"2026-04-09T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97377","published_at":"2026-04-11T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97362","published_at":"2026-04-02T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97366","published_at":"2026-04-04T12:55:00Z"},{"value":"0.40993","scoring_system":"epss","scoring_elements":"0.97367","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2183"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:P/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369383","reference_id":"1369383","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369383"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://security.gentoo.org/glsa/201612-16","reference_id":"GLSA-201612-16","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201612-16"},{"reference_url":"https://security.gentoo.org/glsa/201701-65","reference_id":"GLSA-201701-65","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201701-65"},{"reference_url":"https://security.gentoo.org/glsa/201707-01","reference_id":"GLSA-201707-01","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201707-01"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0336","reference_id":"RHSA-2017:0336","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0337","reference_id":"RHSA-2017:0337","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0338","reference_id":"RHSA-2017:0338","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0338"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:0462","reference_id":"RHSA-2017:0462","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:0462"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1216","reference_id":"RHSA-2017:1216","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1216"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2708","reference_id":"RHSA-2017:2708","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2708"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2709","reference_id":"RHSA-2017:2709","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2709"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:2710","reference_id":"RHSA-2017:2710","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:2710"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3239","reference_id":"RHSA-2017:3239","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3239"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:3240","reference_id":"RHSA-2017:3240","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:3240"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2123","reference_id":"RHSA-2018:2123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:1245","reference_id":"RHSA-2019:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2019:2859","reference_id":"RHSA-2019:2859","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2019:2859"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:0451","reference_id":"RHSA-2020:0451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:0451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3842","reference_id":"RHSA-2020:3842","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3842"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:0308","reference_id":"RHSA-2021:0308","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:0308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2021:2438","reference_id":"RHSA-2021:2438","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2021:2438"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"},{"reference_url":"https://usn.ubuntu.com/3179-1/","reference_id":"USN-3179-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3179-1/"},{"reference_url":"https://usn.ubuntu.com/3194-1/","reference_id":"USN-3194-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3194-1/"},{"reference_url":"https://usn.ubuntu.com/3198-1/","reference_id":"USN-3198-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3198-1/"},{"reference_url":"https://usn.ubuntu.com/3270-1/","reference_id":"USN-3270-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3270-1/"},{"reference_url":"https://usn.ubuntu.com/3372-1/","reference_id":"USN-3372-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3372-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-2183"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x54g-mhs4-mug4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81511?format=json","vulnerability_id":"VCID-xbme-7ph4-p3bz","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2182.json","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2182.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2182","reference_id":"","reference_type":"","scores":[{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96558","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96591","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96583","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96588","published_at":"2026-04-12T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96567","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96573","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29224","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:S/C:N/I:P/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1367340","reference_id":"1367340","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1367340"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2185","reference_id":"RHSA-2018:2185","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2186","reference_id":"RHSA-2018:2186","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2186"},{"reference_url":"https://access.redhat.com/errata/RHSA-2018:2187","reference_id":"RHSA-2018:2187","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2018:2187"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-2182"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xbme-7ph4-p3bz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/81509?format=json","vulnerability_id":"VCID-yba7-p3a3-yydb","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2179.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-2179.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2179","reference_id":"","reference_type":"","scores":[{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.95177","published_at":"2026-04-01T12:55:00Z"},{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.95214","published_at":"2026-04-13T12:55:00Z"},{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.95205","published_at":"2026-04-09T12:55:00Z"},{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.9521","published_at":"2026-04-11T12:55:00Z"},{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.95211","published_at":"2026-04-12T12:55:00Z"},{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.95188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.9519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.95193","published_at":"2026-04-07T12:55:00Z"},{"value":"0.18307","scoring_system":"epss","scoring_elements":"0.95201","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6303"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369504","reference_id":"1369504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1369504"},{"reference_url":"https://security.archlinux.org/ASA-201609-23","reference_id":"ASA-201609-23","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-23"},{"reference_url":"https://security.archlinux.org/ASA-201609-24","reference_id":"ASA-201609-24","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201609-24"},{"reference_url":"https://security.archlinux.org/AVG-29","reference_id":"AVG-29","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-29"},{"reference_url":"https://security.archlinux.org/AVG-30","reference_id":"AVG-30","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2016:1940","reference_id":"RHSA-2016:1940","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2016:1940"},{"reference_url":"https://usn.ubuntu.com/3087-1/","reference_id":"USN-3087-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3087-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/373167?format=json","purl":"pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-wvqv-zs7x-qqh3"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.i-1"}],"aliases":["CVE-2016-2179"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yba7-p3a3-yydb"}],"fixing_vulnerabilities":[],"risk_score":"4.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/lib32-openssl@1:1.0.2.h-1"}