Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
Typedeb
Namespacedebian
Namegnutls28
Version3.7.9-2+deb12u5
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.7.9-2+deb12u6
Latest_non_vulnerable_version3.8.12-3
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1xj6-a5qz-nyhx
vulnerability_id VCID-1xj6-a5qz-nyhx
summary
Multiple vulnerabilities have been discovered in GnuTLS, the worst
    of which could lead to Denial of Service.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00003.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00009.html
3
reference_url http://lists.opensuse.org/opensuse-updates/2013-05/msg00023.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2013-05/msg00023.html
4
reference_url http://nmav.gnutls.org/2013/02/time-is-money-for-cbc-ciphersuites.html
reference_id
reference_type
scores
url http://nmav.gnutls.org/2013/02/time-is-money-for-cbc-ciphersuites.html
5
reference_url http://openwall.com/lists/oss-security/2013/02/05/24
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/02/05/24
6
reference_url http://rhn.redhat.com/errata/RHSA-2013-0588.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0588.html
7
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1619.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1619.json
8
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-1619
reference_id
reference_type
scores
0
value 0.01222
scoring_system epss
scoring_elements 0.79093
published_at 2026-04-13T12:55:00Z
1
value 0.01222
scoring_system epss
scoring_elements 0.79103
published_at 2026-04-12T12:55:00Z
2
value 0.01222
scoring_system epss
scoring_elements 0.79043
published_at 2026-04-01T12:55:00Z
3
value 0.01222
scoring_system epss
scoring_elements 0.79049
published_at 2026-04-02T12:55:00Z
4
value 0.01222
scoring_system epss
scoring_elements 0.79075
published_at 2026-04-04T12:55:00Z
5
value 0.01222
scoring_system epss
scoring_elements 0.7906
published_at 2026-04-07T12:55:00Z
6
value 0.01222
scoring_system epss
scoring_elements 0.79085
published_at 2026-04-08T12:55:00Z
7
value 0.01222
scoring_system epss
scoring_elements 0.79092
published_at 2026-04-09T12:55:00Z
8
value 0.01222
scoring_system epss
scoring_elements 0.79116
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-1619
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619
10
reference_url http://secunia.com/advisories/57260
reference_id
reference_type
scores
url http://secunia.com/advisories/57260
11
reference_url http://secunia.com/advisories/57274
reference_id
reference_type
scores
url http://secunia.com/advisories/57274
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://gitorious.org/gnutls/gnutls/commit/328ee22c1b3951e060c7124c7cb1cee592c59bc0
reference_id
reference_type
scores
url https://gitorious.org/gnutls/gnutls/commit/328ee22c1b3951e060c7124c7cb1cee592c59bc0
14
reference_url https://gitorious.org/gnutls/gnutls/commit/b8391806cd79095fe566f2401d8c7ad85a64b198
reference_id
reference_type
scores
url https://gitorious.org/gnutls/gnutls/commit/b8391806cd79095fe566f2401d8c7ad85a64b198
15
reference_url http://www.gnutls.org/security.html#GNUTLS-SA-2013-1
reference_id
reference_type
scores
url http://www.gnutls.org/security.html#GNUTLS-SA-2013-1
16
reference_url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
reference_id
reference_type
scores
url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
17
reference_url http://www.ubuntu.com/usn/USN-1752-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1752-1
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=908238
reference_id 908238
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=908238
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.0:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.2:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.3:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.0.4:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.0:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.0:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.1:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.10.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.2:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.10.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.3:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.10.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.4:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.10.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.10.5:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.1:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.2:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.0:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.1:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.10:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.11:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.12:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.13:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.14:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.15:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.16:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.17:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.18:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.19:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.2:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.20:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.21:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.22:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.3:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.4:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.5:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.6:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.6.1:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.7:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.8:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.12.9:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.3:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.4:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.5:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.6:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.7:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.1.8:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.0:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.1:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.2:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.3:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.4:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.2.5:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.10:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.11:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.2:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.3:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.4:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.5:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.6:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.7:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.8:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.3.9:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.4.0:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.4.1:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.4.2:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.4.3:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.5.0:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.2:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.3:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.4:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.5:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.6.6:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.7.4:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.0:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.1:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.2:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.3:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.4:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.5:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:2.8.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:2.8.6:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
133
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
134
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
135
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
136
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
137
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-1619
reference_id CVE-2013-1619
reference_type
scores
0
value 4.0
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:P/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-1619
138
reference_url https://security.gentoo.org/glsa/201310-18
reference_id GLSA-201310-18
reference_type
scores
url https://security.gentoo.org/glsa/201310-18
139
reference_url https://access.redhat.com/errata/RHSA-2013:0588
reference_id RHSA-2013:0588
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0588
140
reference_url https://access.redhat.com/errata/RHSA-2013:0636
reference_id RHSA-2013:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0636
141
reference_url https://usn.ubuntu.com/1752-1/
reference_id USN-1752-1
reference_type
scores
url https://usn.ubuntu.com/1752-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.0.22-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.0.22-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.0.22-3%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2013-1619
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xj6-a5qz-nyhx
1
url VCID-286x-avqh-73cx
vulnerability_id VCID-286x-avqh-73cx
summary gnutls: gnutls: Remote Denial of Service via crafted ClientHello with invalid PSK binder
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1584.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-1584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-1584
reference_id
reference_type
scores
0
value 0.00081
scoring_system epss
scoring_elements 0.24038
published_at 2026-04-11T12:55:00Z
1
value 0.00081
scoring_system epss
scoring_elements 0.23995
published_at 2026-04-12T12:55:00Z
2
value 0.00081
scoring_system epss
scoring_elements 0.23939
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-1584
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2435258
reference_id 2435258
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-10T14:09:46Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2435258
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
11
reference_url https://access.redhat.com/security/cve/CVE-2026-1584
reference_id CVE-2026-1584
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-04-10T14:09:46Z/
url https://access.redhat.com/security/cve/CVE-2026-1584
fixed_packages
0
url pkg:deb/debian/gnutls28@0?distro=trixie
purl pkg:deb/debian/gnutls28@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@0%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-1%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2026-1584, GNUTLS-SA-2026-02-09-1
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-286x-avqh-73cx
2
url VCID-334s-gdq8-jucy
vulnerability_id VCID-334s-gdq8-jucy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6251.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-6251.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-6251
reference_id
reference_type
scores
0
value 0.06692
scoring_system epss
scoring_elements 0.91194
published_at 2026-04-01T12:55:00Z
1
value 0.06692
scoring_system epss
scoring_elements 0.91198
published_at 2026-04-02T12:55:00Z
2
value 0.06692
scoring_system epss
scoring_elements 0.91207
published_at 2026-04-04T12:55:00Z
3
value 0.06692
scoring_system epss
scoring_elements 0.91214
published_at 2026-04-07T12:55:00Z
4
value 0.06692
scoring_system epss
scoring_elements 0.91228
published_at 2026-04-08T12:55:00Z
5
value 0.06692
scoring_system epss
scoring_elements 0.91234
published_at 2026-04-09T12:55:00Z
6
value 0.06692
scoring_system epss
scoring_elements 0.91241
published_at 2026-04-11T12:55:00Z
7
value 0.06692
scoring_system epss
scoring_elements 0.91245
published_at 2026-04-12T12:55:00Z
8
value 0.06692
scoring_system epss
scoring_elements 0.91244
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-6251
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6251
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1251902
reference_id 1251902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1251902
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795068
reference_id 795068
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=795068
5
reference_url https://usn.ubuntu.com/2727-1/
reference_id USN-2727-1
reference_type
scores
url https://usn.ubuntu.com/2727-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.17-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.3.17-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.17-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2015-6251
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-334s-gdq8-jucy
3
url VCID-3c48-skyt-43a7
vulnerability_id VCID-3c48-skyt-43a7
summary
Multiple vulnerabilities have been found in GnuTLS, allowing a
    remote attacker to perform man-in-the-middle or Denial of Service attacks.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1573.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1573.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1573
reference_id
reference_type
scores
0
value 0.09562
scoring_system epss
scoring_elements 0.92834
published_at 2026-04-01T12:55:00Z
1
value 0.09562
scoring_system epss
scoring_elements 0.92842
published_at 2026-04-02T12:55:00Z
2
value 0.09562
scoring_system epss
scoring_elements 0.92845
published_at 2026-04-04T12:55:00Z
3
value 0.09562
scoring_system epss
scoring_elements 0.92843
published_at 2026-04-07T12:55:00Z
4
value 0.09562
scoring_system epss
scoring_elements 0.92852
published_at 2026-04-08T12:55:00Z
5
value 0.09562
scoring_system epss
scoring_elements 0.92856
published_at 2026-04-09T12:55:00Z
6
value 0.09562
scoring_system epss
scoring_elements 0.92861
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1573
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=805432
reference_id 805432
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=805432
4
reference_url https://security.gentoo.org/glsa/201206-18
reference_id GLSA-201206-18
reference_type
scores
url https://security.gentoo.org/glsa/201206-18
5
reference_url https://access.redhat.com/errata/RHSA-2012:0428
reference_id RHSA-2012:0428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0428
6
reference_url https://access.redhat.com/errata/RHSA-2012:0429
reference_id RHSA-2012:0429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0429
7
reference_url https://access.redhat.com/errata/RHSA-2012:0531
reference_id RHSA-2012:0531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2012:0531
8
reference_url https://usn.ubuntu.com/1418-1/
reference_id USN-1418-1
reference_type
scores
url https://usn.ubuntu.com/1418-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.0.17-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.0.17-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.0.17-2%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2012-1573
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3c48-skyt-43a7
4
url VCID-3qcs-1fcj-m3fw
vulnerability_id VCID-3qcs-1fcj-m3fw
summary gnutls: DTLS client hello contains a random value of all zeroes
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00015.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-11501.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
reference_id
reference_type
scores
0
value 0.11487
scoring_system epss
scoring_elements 0.93575
published_at 2026-04-01T12:55:00Z
1
value 0.11487
scoring_system epss
scoring_elements 0.93611
published_at 2026-04-13T12:55:00Z
2
value 0.11487
scoring_system epss
scoring_elements 0.93602
published_at 2026-04-08T12:55:00Z
3
value 0.11487
scoring_system epss
scoring_elements 0.93605
published_at 2026-04-09T12:55:00Z
4
value 0.11487
scoring_system epss
scoring_elements 0.9361
published_at 2026-04-12T12:55:00Z
5
value 0.11487
scoring_system epss
scoring_elements 0.93584
published_at 2026-04-02T12:55:00Z
6
value 0.11487
scoring_system epss
scoring_elements 0.93592
published_at 2026-04-04T12:55:00Z
7
value 0.11487
scoring_system epss
scoring_elements 0.93593
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-11501
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11501
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/960
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/-/issues/960
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ILMOWPKMTZAIMK5F32TUMO34XCABUCFJ/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WDYY3R4F5CUTFAMXH2C5NKYFVDEJLTT7/
9
reference_url https://security.gentoo.org/glsa/202004-06
reference_id
reference_type
scores
url https://security.gentoo.org/glsa/202004-06
10
reference_url https://security.netapp.com/advisory/ntap-20200416-0002/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20200416-0002/
11
reference_url https://www.debian.org/security/2020/dsa-4652
reference_id
reference_type
scores
url https://www.debian.org/security/2020/dsa-4652
12
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
reference_id
reference_type
scores
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
reference_id 1821896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1821896
14
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
reference_id 955556
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=955556
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
reference_id CVE-2020-11501
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:N
1
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2020-11501
22
reference_url https://access.redhat.com/errata/RHSA-2020:1998
reference_id RHSA-2020:1998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:1998
23
reference_url https://usn.ubuntu.com/4322-1/
reference_id USN-4322-1
reference_type
scores
url https://usn.ubuntu.com/4322-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.13-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.6.13-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.13-2%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2020-11501, GNUTLS-SA-2020-03-31
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3qcs-1fcj-m3fw
5
url VCID-4f3z-x697-abd5
vulnerability_id VCID-4f3z-x697-abd5
summary gnutls: Out-of-bounds write related to the cdk_pkt_read function (GNUTLS-SA-2017-3)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7869.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7869.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7869
reference_id
reference_type
scores
0
value 0.00703
scoring_system epss
scoring_elements 0.72024
published_at 2026-04-01T12:55:00Z
1
value 0.00703
scoring_system epss
scoring_elements 0.72066
published_at 2026-04-13T12:55:00Z
2
value 0.00703
scoring_system epss
scoring_elements 0.72064
published_at 2026-04-08T12:55:00Z
3
value 0.00703
scoring_system epss
scoring_elements 0.72076
published_at 2026-04-09T12:55:00Z
4
value 0.00703
scoring_system epss
scoring_elements 0.72099
published_at 2026-04-11T12:55:00Z
5
value 0.00703
scoring_system epss
scoring_elements 0.72082
published_at 2026-04-12T12:55:00Z
6
value 0.00703
scoring_system epss
scoring_elements 0.72031
published_at 2026-04-02T12:55:00Z
7
value 0.00703
scoring_system epss
scoring_elements 0.72051
published_at 2026-04-04T12:55:00Z
8
value 0.00703
scoring_system epss
scoring_elements 0.72027
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7869
2
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe
6
reference_url https://www.gnutls.org/security.html
reference_id
reference_type
scores
url https://www.gnutls.org/security.html
7
reference_url http://www.securityfocus.com/bid/97040
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/97040
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1443033
reference_id 1443033
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1443033
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
10
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-7869
reference_id CVE-2017-7869
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-7869
11
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
12
reference_url https://usn.ubuntu.com/3318-1/
reference_id USN-3318-1
reference_type
scores
url https://usn.ubuntu.com/3318-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-4?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-4%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2017-7869
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4f3z-x697-abd5
6
url VCID-4ywm-88f3-vqbq
vulnerability_id VCID-4ywm-88f3-vqbq
summary gnutls: double-free vulnerability in libgnutls 3.0.x
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1663.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-1663
reference_id
reference_type
scores
0
value 0.01494
scoring_system epss
scoring_elements 0.81012
published_at 2026-04-01T12:55:00Z
1
value 0.01494
scoring_system epss
scoring_elements 0.81021
published_at 2026-04-02T12:55:00Z
2
value 0.01494
scoring_system epss
scoring_elements 0.81044
published_at 2026-04-07T12:55:00Z
3
value 0.01494
scoring_system epss
scoring_elements 0.81072
published_at 2026-04-08T12:55:00Z
4
value 0.01494
scoring_system epss
scoring_elements 0.81078
published_at 2026-04-09T12:55:00Z
5
value 0.01494
scoring_system epss
scoring_elements 0.81096
published_at 2026-04-11T12:55:00Z
6
value 0.01494
scoring_system epss
scoring_elements 0.81082
published_at 2026-04-12T12:55:00Z
7
value 0.01494
scoring_system epss
scoring_elements 0.81075
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-1663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1663
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=803169
reference_id 803169
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=803169
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24865.txt
reference_id CVE-2012-1663;OSVDB-80179
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/dos/24865.txt
fixed_packages
0
url pkg:deb/debian/gnutls28@3.0.14-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.0.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.0.14-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2012-1663
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ywm-88f3-vqbq
7
url VCID-5aea-cjz1-jkh1
vulnerability_id VCID-5aea-cjz1-jkh1
summary gnutls: Environment variable GNUTLS_KEYLOGFILE is obtained via insecure getenv()
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4456.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4456.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-4456
reference_id
reference_type
scores
0
value 0.00246
scoring_system epss
scoring_elements 0.47857
published_at 2026-04-01T12:55:00Z
1
value 0.00246
scoring_system epss
scoring_elements 0.47894
published_at 2026-04-02T12:55:00Z
2
value 0.00246
scoring_system epss
scoring_elements 0.47916
published_at 2026-04-08T12:55:00Z
3
value 0.00246
scoring_system epss
scoring_elements 0.47864
published_at 2026-04-07T12:55:00Z
4
value 0.00246
scoring_system epss
scoring_elements 0.47911
published_at 2026-04-09T12:55:00Z
5
value 0.00246
scoring_system epss
scoring_elements 0.47935
published_at 2026-04-11T12:55:00Z
6
value 0.00246
scoring_system epss
scoring_elements 0.47913
published_at 2026-04-12T12:55:00Z
7
value 0.00246
scoring_system epss
scoring_elements 0.47922
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-4456
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4456
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4456
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.9
scoring_system cvssv2
scoring_elements AV:L/AC:L/Au:N/C:N/I:C/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1343505
reference_id 1343505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1343505
fixed_packages
0
url pkg:deb/debian/gnutls28@3.4.13-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.4.13-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.4.13-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2016-4456
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5aea-cjz1-jkh1
8
url VCID-5b5j-s52a-7bda
vulnerability_id VCID-5b5j-s52a-7bda
summary incorrect certificate verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0092.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0092.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-0092
reference_id
reference_type
scores
0
value 0.04785
scoring_system epss
scoring_elements 0.89432
published_at 2026-04-01T12:55:00Z
1
value 0.04785
scoring_system epss
scoring_elements 0.89437
published_at 2026-04-02T12:55:00Z
2
value 0.04785
scoring_system epss
scoring_elements 0.89447
published_at 2026-04-04T12:55:00Z
3
value 0.04785
scoring_system epss
scoring_elements 0.8945
published_at 2026-04-07T12:55:00Z
4
value 0.04785
scoring_system epss
scoring_elements 0.89466
published_at 2026-04-08T12:55:00Z
5
value 0.04785
scoring_system epss
scoring_elements 0.89469
published_at 2026-04-09T12:55:00Z
6
value 0.04785
scoring_system epss
scoring_elements 0.89478
published_at 2026-04-11T12:55:00Z
7
value 0.04785
scoring_system epss
scoring_elements 0.89476
published_at 2026-04-12T12:55:00Z
8
value 0.04785
scoring_system epss
scoring_elements 0.89472
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-0092
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1069865
reference_id 1069865
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1069865
4
reference_url https://security.gentoo.org/glsa/201406-09
reference_id GLSA-201406-09
reference_type
scores
url https://security.gentoo.org/glsa/201406-09
5
reference_url https://access.redhat.com/errata/RHSA-2014:0246
reference_id RHSA-2014:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0246
6
reference_url https://access.redhat.com/errata/RHSA-2014:0247
reference_id RHSA-2014:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0247
7
reference_url https://access.redhat.com/errata/RHSA-2014:0288
reference_id RHSA-2014:0288
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0288
8
reference_url https://access.redhat.com/errata/RHSA-2014:0339
reference_id RHSA-2014:0339
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0339
9
reference_url https://usn.ubuntu.com/2127-1/
reference_id USN-2127-1
reference_type
scores
url https://usn.ubuntu.com/2127-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.2.11-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.2.11-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.2.11-2%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2014-0092
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5b5j-s52a-7bda
9
url VCID-6fzu-8998-abdk
vulnerability_id VCID-6fzu-8998-abdk
summary
An information disclosure vulnerability in GnuTLS allow remote
    attackers to obtain sensitive information.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13777.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
reference_id
reference_type
scores
0
value 0.00863
scoring_system epss
scoring_elements 0.75032
published_at 2026-04-01T12:55:00Z
1
value 0.00863
scoring_system epss
scoring_elements 0.7504
published_at 2026-04-07T12:55:00Z
2
value 0.00863
scoring_system epss
scoring_elements 0.75064
published_at 2026-04-04T12:55:00Z
3
value 0.00863
scoring_system epss
scoring_elements 0.75074
published_at 2026-04-08T12:55:00Z
4
value 0.00863
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-09T12:55:00Z
5
value 0.00863
scoring_system epss
scoring_elements 0.75108
published_at 2026-04-11T12:55:00Z
6
value 0.00863
scoring_system epss
scoring_elements 0.75034
published_at 2026-04-02T12:55:00Z
7
value 0.01521
scoring_system epss
scoring_elements 0.81255
published_at 2026-04-13T12:55:00Z
8
value 0.01521
scoring_system epss
scoring_elements 0.81263
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13777
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13777
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
reference_id 1843723
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1843723
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
reference_id 962289
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962289
6
reference_url https://security.archlinux.org/ASA-202006-2
reference_id ASA-202006-2
reference_type
scores
url https://security.archlinux.org/ASA-202006-2
7
reference_url https://security.archlinux.org/AVG-1177
reference_id AVG-1177
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1177
8
reference_url https://security.gentoo.org/glsa/202006-01
reference_id GLSA-202006-01
reference_type
scores
url https://security.gentoo.org/glsa/202006-01
9
reference_url https://access.redhat.com/errata/RHSA-2020:2637
reference_id RHSA-2020:2637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2637
10
reference_url https://access.redhat.com/errata/RHSA-2020:2638
reference_id RHSA-2020:2638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2638
11
reference_url https://access.redhat.com/errata/RHSA-2020:2639
reference_id RHSA-2020:2639
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:2639
12
reference_url https://usn.ubuntu.com/4384-1/
reference_id USN-4384-1
reference_type
scores
url https://usn.ubuntu.com/4384-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.14-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.6.14-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.14-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2020-13777, GNUTLS-SA-2020-06-03
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6fzu-8998-abdk
10
url VCID-6u4f-wt5u-8ueb
vulnerability_id VCID-6u4f-wt5u-8ueb
summary gnutls: Incorrect certificate validation when using OCSP responses (GNUTLS-SA-2016-3)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7444.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-7444.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-7444
reference_id
reference_type
scores
0
value 0.01021
scoring_system epss
scoring_elements 0.77173
published_at 2026-04-01T12:55:00Z
1
value 0.01021
scoring_system epss
scoring_elements 0.77233
published_at 2026-04-13T12:55:00Z
2
value 0.01021
scoring_system epss
scoring_elements 0.7723
published_at 2026-04-09T12:55:00Z
3
value 0.01021
scoring_system epss
scoring_elements 0.77258
published_at 2026-04-11T12:55:00Z
4
value 0.01021
scoring_system epss
scoring_elements 0.77237
published_at 2026-04-12T12:55:00Z
5
value 0.01021
scoring_system epss
scoring_elements 0.77179
published_at 2026-04-02T12:55:00Z
6
value 0.01021
scoring_system epss
scoring_elements 0.77208
published_at 2026-04-04T12:55:00Z
7
value 0.01021
scoring_system epss
scoring_elements 0.77189
published_at 2026-04-07T12:55:00Z
8
value 0.01021
scoring_system epss
scoring_elements 0.77221
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-7444
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1374266
reference_id 1374266
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1374266
5
reference_url https://security.archlinux.org/ASA-201609-25
reference_id ASA-201609-25
reference_type
scores
url https://security.archlinux.org/ASA-201609-25
6
reference_url https://security.archlinux.org/ASA-201609-26
reference_id ASA-201609-26
reference_type
scores
url https://security.archlinux.org/ASA-201609-26
7
reference_url https://security.archlinux.org/AVG-17
reference_id AVG-17
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-17
8
reference_url https://security.archlinux.org/AVG-26
reference_id AVG-26
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-26
9
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
10
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.3-4?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.3-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.3-4%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2016-7444
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6u4f-wt5u-8ueb
11
url VCID-6ya9-m3gf-wugy
vulnerability_id VCID-6ya9-m3gf-wugy
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0282.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0282.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0282
reference_id
reference_type
scores
0
value 0.00198
scoring_system epss
scoring_elements 0.41745
published_at 2026-04-01T12:55:00Z
1
value 0.00198
scoring_system epss
scoring_elements 0.4181
published_at 2026-04-02T12:55:00Z
2
value 0.00198
scoring_system epss
scoring_elements 0.41839
published_at 2026-04-04T12:55:00Z
3
value 0.00198
scoring_system epss
scoring_elements 0.41768
published_at 2026-04-07T12:55:00Z
4
value 0.00198
scoring_system epss
scoring_elements 0.41818
published_at 2026-04-12T12:55:00Z
5
value 0.00198
scoring_system epss
scoring_elements 0.41828
published_at 2026-04-09T12:55:00Z
6
value 0.00198
scoring_system epss
scoring_elements 0.41852
published_at 2026-04-11T12:55:00Z
7
value 0.00198
scoring_system epss
scoring_elements 0.41806
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0282
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1194371
reference_id 1194371
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1194371
5
reference_url https://access.redhat.com/errata/RHSA-2015:1457
reference_id RHSA-2015:1457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1457
6
reference_url https://usn.ubuntu.com/2540-1/
reference_id USN-2540-1
reference_type
scores
url https://usn.ubuntu.com/2540-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@0?distro=trixie
purl pkg:deb/debian/gnutls28@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@0%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2015-0282
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6ya9-m3gf-wugy
12
url VCID-86j1-j381-cucy
vulnerability_id VCID-86j1-j381-cucy
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2509.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-2509.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-2509
reference_id
reference_type
scores
0
value 0.00628
scoring_system epss
scoring_elements 0.70245
published_at 2026-04-13T12:55:00Z
1
value 0.00628
scoring_system epss
scoring_elements 0.70257
published_at 2026-04-12T12:55:00Z
2
value 0.00908
scoring_system epss
scoring_elements 0.75756
published_at 2026-04-08T12:55:00Z
3
value 0.00908
scoring_system epss
scoring_elements 0.75712
published_at 2026-04-02T12:55:00Z
4
value 0.00908
scoring_system epss
scoring_elements 0.75791
published_at 2026-04-11T12:55:00Z
5
value 0.00908
scoring_system epss
scoring_elements 0.75767
published_at 2026-04-09T12:55:00Z
6
value 0.00908
scoring_system epss
scoring_elements 0.75743
published_at 2026-04-04T12:55:00Z
7
value 0.00908
scoring_system epss
scoring_elements 0.75722
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-2509
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2509
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
reference_id 004746.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2108977
reference_id 2108977
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2108977
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
reference_id 6FL27JS3VM74YEQU7PGB62USO3KSBYZX
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6FL27JS3VM74YEQU7PGB62USO3KSBYZX/
7
reference_url https://access.redhat.com/security/cve/CVE-2022-2509
reference_id CVE-2022-2509
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://access.redhat.com/security/cve/CVE-2022-2509
8
reference_url https://www.debian.org/security/2022/dsa-5203
reference_id dsa-5203
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://www.debian.org/security/2022/dsa-5203
9
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
10
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
reference_id msg00002.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-12-02T20:43:57Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00002.html
11
reference_url https://access.redhat.com/errata/RHSA-2022:6854
reference_id RHSA-2022:6854
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6854
12
reference_url https://access.redhat.com/errata/RHSA-2022:7105
reference_id RHSA-2022:7105
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7105
13
reference_url https://usn.ubuntu.com/5550-1/
reference_id USN-5550-1
reference_type
scores
url https://usn.ubuntu.com/5550-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u2%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.7-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.7-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.7-1%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2022-2509, GNUTLS-SA-2022-07-07
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86j1-j381-cucy
13
url VCID-92x9-x1ep-cqdn
vulnerability_id VCID-92x9-x1ep-cqdn
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28834.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28834
reference_id
reference_type
scores
0
value 0.01705
scoring_system epss
scoring_elements 0.8227
published_at 2026-04-04T12:55:00Z
1
value 0.01705
scoring_system epss
scoring_elements 0.82292
published_at 2026-04-08T12:55:00Z
2
value 0.01705
scoring_system epss
scoring_elements 0.82265
published_at 2026-04-07T12:55:00Z
3
value 0.01705
scoring_system epss
scoring_elements 0.82251
published_at 2026-04-02T12:55:00Z
4
value 0.02294
scoring_system epss
scoring_elements 0.84718
published_at 2026-04-13T12:55:00Z
5
value 0.02294
scoring_system epss
scoring_elements 0.84711
published_at 2026-04-09T12:55:00Z
6
value 0.02294
scoring_system epss
scoring_elements 0.84729
published_at 2026-04-11T12:55:00Z
7
value 0.02294
scoring_system epss
scoring_elements 0.84724
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28834
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
reference_id 004845.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067464
reference_id 1067464
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067464
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269228
reference_id 2269228
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269228
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2024-28834
reference_id CVE-2024-28834
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/security/cve/CVE-2024-28834
21
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
22
reference_url https://access.redhat.com/errata/RHSA-2024:1784
reference_id RHSA-2024:1784
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1784
23
reference_url https://access.redhat.com/errata/RHSA-2024:1879
reference_id RHSA-2024:1879
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1879
24
reference_url https://access.redhat.com/errata/RHSA-2024:1997
reference_id RHSA-2024:1997
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:1997
25
reference_url https://access.redhat.com/errata/RHSA-2024:2044
reference_id RHSA-2024:2044
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2044
26
reference_url https://access.redhat.com/errata/RHSA-2024:2570
reference_id RHSA-2024:2570
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2570
27
reference_url https://access.redhat.com/errata/RHSA-2024:2889
reference_id RHSA-2024:2889
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:20:34Z/
url https://access.redhat.com/errata/RHSA-2024:2889
28
reference_url https://usn.ubuntu.com/6733-1/
reference_id USN-6733-1
reference_type
scores
url https://usn.ubuntu.com/6733-1/
29
reference_url https://usn.ubuntu.com/6733-2/
reference_id USN-6733-2
reference_type
scores
url https://usn.ubuntu.com/6733-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u6?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u6%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.4-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.4-2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2024-28834, GNUTLS-SA-2023-12-04
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-92x9-x1ep-cqdn
14
url VCID-9pdw-udwq-6kbz
vulnerability_id VCID-9pdw-udwq-6kbz
summary gnutls: Stack-based Buffer Overflow in gnutls_pkcs11_token_init() Function
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9820.json
reference_id
reference_type
scores
0
value 4.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-9820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-9820
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02569
published_at 2026-04-02T12:55:00Z
1
value 0.00015
scoring_system epss
scoring_elements 0.02855
published_at 2026-04-13T12:55:00Z
2
value 0.00015
scoring_system epss
scoring_elements 0.02875
published_at 2026-04-04T12:55:00Z
3
value 0.00015
scoring_system epss
scoring_elements 0.02883
published_at 2026-04-07T12:55:00Z
4
value 0.00015
scoring_system epss
scoring_elements 0.02884
published_at 2026-04-08T12:55:00Z
5
value 0.00015
scoring_system epss
scoring_elements 0.02907
published_at 2026-04-09T12:55:00Z
6
value 0.00015
scoring_system epss
scoring_elements 0.02879
published_at 2026-04-11T12:55:00Z
7
value 0.00015
scoring_system epss
scoring_elements 0.0286
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-9820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121146
reference_id 1121146
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1121146
5
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1732
reference_id 1732
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1732
6
reference_url https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
reference_id 1d56f96f6ab5034d677136b9d50b5a75dff0faf5
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://gitlab.com/gnutls/gnutls/-/commit/1d56f96f6ab5034d677136b9d50b5a75dff0faf5
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2392528
reference_id 2392528
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2392528
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
21
reference_url https://access.redhat.com/security/cve/CVE-2025-9820
reference_id CVE-2025-9820
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/security/cve/CVE-2025-9820
22
reference_url https://access.redhat.com/errata/RHSA-2026:3477
reference_id RHSA-2026:3477
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:3477
23
reference_url https://access.redhat.com/errata/RHSA-2026:4188
reference_id RHSA-2026:4188
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4188
24
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4655
25
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:4943
26
reference_url https://access.redhat.com/errata/RHSA-2026:5585
reference_id RHSA-2026:5585
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:5585
27
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:5606
28
reference_url https://access.redhat.com/errata/RHSA-2026:7329
reference_id RHSA-2026:7329
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://access.redhat.com/errata/RHSA-2026:7329
29
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
reference_id security-new.html#GNUTLS-SA-2025-11-18
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-26T20:10:45Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2025-11-18
30
reference_url https://usn.ubuntu.com/8043-1/
reference_id USN-8043-1
reference_type
scores
url https://usn.ubuntu.com/8043-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u9%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u6%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u1%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/gnutls28@3.8.11-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.11-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.11-3%3Fdistro=trixie
7
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2025-9820, GNUTLS-SA-2025-11-18
risk_score 1.8
exploitability 0.5
weighted_severity 3.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9pdw-udwq-6kbz
15
url VCID-a18u-4j99-nbf8
vulnerability_id VCID-a18u-4j99-nbf8
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0553.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0553.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0553
reference_id
reference_type
scores
0
value 0.01029
scoring_system epss
scoring_elements 0.77306
published_at 2026-04-13T12:55:00Z
1
value 0.01029
scoring_system epss
scoring_elements 0.77252
published_at 2026-04-02T12:55:00Z
2
value 0.01029
scoring_system epss
scoring_elements 0.7728
published_at 2026-04-04T12:55:00Z
3
value 0.01029
scoring_system epss
scoring_elements 0.77262
published_at 2026-04-07T12:55:00Z
4
value 0.01029
scoring_system epss
scoring_elements 0.77294
published_at 2026-04-08T12:55:00Z
5
value 0.01029
scoring_system epss
scoring_elements 0.77302
published_at 2026-04-09T12:55:00Z
6
value 0.01029
scoring_system epss
scoring_elements 0.7733
published_at 2026-04-11T12:55:00Z
7
value 0.01029
scoring_system epss
scoring_elements 0.77309
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0553
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
reference_id 004841.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061046
reference_id 1061046
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061046
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1522
reference_id 1522
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1522
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258412
reference_id 2258412
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258412
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_id cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
reference_id cpe:/a:redhat:rhel_eus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.6::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
reference_id cpe:/a:redhat:rhel_eus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:8.8::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
reference_id cpe:/o:redhat:rhel_eus:8.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.6::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
reference_id cpe:/o:redhat:rhel_eus:8.8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:8.8::baseos
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
22
reference_url https://access.redhat.com/security/cve/CVE-2024-0553
reference_id CVE-2024-0553
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/security/cve/CVE-2024-0553
23
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
24
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0533
25
reference_url https://access.redhat.com/errata/RHSA-2024:0627
reference_id RHSA-2024:0627
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0627
26
reference_url https://access.redhat.com/errata/RHSA-2024:0796
reference_id RHSA-2024:0796
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:0796
27
reference_url https://access.redhat.com/errata/RHSA-2024:1082
reference_id RHSA-2024:1082
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1082
28
reference_url https://access.redhat.com/errata/RHSA-2024:1108
reference_id RHSA-2024:1108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1108
29
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:1383
30
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-16T15:03:37Z/
url https://access.redhat.com/errata/RHSA-2024:2094
31
reference_url https://usn.ubuntu.com/6593-1/
reference_id USN-6593-1
reference_type
scores
url https://usn.ubuntu.com/6593-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.3-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.3-1%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2024-0553
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a18u-4j99-nbf8
16
url VCID-a296-a2f2-kfba
vulnerability_id VCID-a296-a2f2-kfba
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3829.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3829.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3829
reference_id
reference_type
scores
0
value 0.02082
scoring_system epss
scoring_elements 0.83926
published_at 2026-04-01T12:55:00Z
1
value 0.02082
scoring_system epss
scoring_elements 0.83994
published_at 2026-04-13T12:55:00Z
2
value 0.02082
scoring_system epss
scoring_elements 0.83958
published_at 2026-04-07T12:55:00Z
3
value 0.02082
scoring_system epss
scoring_elements 0.83982
published_at 2026-04-08T12:55:00Z
4
value 0.02082
scoring_system epss
scoring_elements 0.83988
published_at 2026-04-09T12:55:00Z
5
value 0.02082
scoring_system epss
scoring_elements 0.84004
published_at 2026-04-11T12:55:00Z
6
value 0.02082
scoring_system epss
scoring_elements 0.83998
published_at 2026-04-12T12:55:00Z
7
value 0.02082
scoring_system epss
scoring_elements 0.8394
published_at 2026-04-02T12:55:00Z
8
value 0.02082
scoring_system epss
scoring_elements 0.83956
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3829
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3829
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://gitlab.com/gnutls/gnutls/issues/694
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/issues/694
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7TJIBRJWGWSH6XIO2MXIQ3W6ES4R6I4/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L7TJIBRJWGWSH6XIO2MXIQ3W6ES4R6I4/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WRSOL66LHP4SD3Y2ECJDOGT4K663ECDU/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WRSOL66LHP4SD3Y2ECJDOGT4K663ECDU/
10
reference_url https://security.netapp.com/advisory/ntap-20190619-0004/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190619-0004/
11
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
reference_id
reference_type
scores
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1677048
reference_id 1677048
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1677048
13
reference_url https://security.archlinux.org/ASA-201904-2
reference_id ASA-201904-2
reference_type
scores
url https://security.archlinux.org/ASA-201904-2
14
reference_url https://security.archlinux.org/AVG-945
reference_id AVG-945
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-945
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3829
reference_id CVE-2019-3829
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3829
18
reference_url https://security.gentoo.org/glsa/201904-14
reference_id GLSA-201904-14
reference_type
scores
url https://security.gentoo.org/glsa/201904-14
19
reference_url https://access.redhat.com/errata/RHSA-2019:3600
reference_id RHSA-2019:3600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3600
20
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-2%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2019-3829
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a296-a2f2-kfba
17
url VCID-abn3-2b4q-z7ga
vulnerability_id VCID-abn3-2b4q-z7ga
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5981.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5981.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5981
reference_id
reference_type
scores
0
value 0.00916
scoring_system epss
scoring_elements 0.75849
published_at 2026-04-02T12:55:00Z
1
value 0.00916
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-04T12:55:00Z
2
value 0.00916
scoring_system epss
scoring_elements 0.75861
published_at 2026-04-07T12:55:00Z
3
value 0.00916
scoring_system epss
scoring_elements 0.75893
published_at 2026-04-08T12:55:00Z
4
value 0.00916
scoring_system epss
scoring_elements 0.75906
published_at 2026-04-09T12:55:00Z
5
value 0.00916
scoring_system epss
scoring_elements 0.75929
published_at 2026-04-11T12:55:00Z
6
value 0.00916
scoring_system epss
scoring_elements 0.75911
published_at 2026-04-12T12:55:00Z
7
value 0.00916
scoring_system epss
scoring_elements 0.75904
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5981
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5981
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056188
reference_id 1056188
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1056188
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2248445
reference_id 2248445
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2248445
6
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
7
reference_url https://access.redhat.com/errata/RHSA-2024:0155
reference_id RHSA-2024:0155
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0155
8
reference_url https://access.redhat.com/errata/RHSA-2024:0319
reference_id RHSA-2024:0319
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0319
9
reference_url https://access.redhat.com/errata/RHSA-2024:0399
reference_id RHSA-2024:0399
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0399
10
reference_url https://access.redhat.com/errata/RHSA-2024:0451
reference_id RHSA-2024:0451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0451
11
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0533
12
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:1383
13
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2094
14
reference_url https://usn.ubuntu.com/6499-1/
reference_id USN-6499-1
reference_type
scores
url https://usn.ubuntu.com/6499-1/
15
reference_url https://usn.ubuntu.com/6499-2/
reference_id USN-6499-2
reference_type
scores
url https://usn.ubuntu.com/6499-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u4?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u4%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u1%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.2-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.2-1%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2023-5981
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-abn3-2b4q-z7ga
18
url VCID-b1m6-r1bv-d7gr
vulnerability_id VCID-b1m6-r1bv-d7gr
summary
Multiple vulnerabilities have been found in PolarSSL, the worst of
    which might allow a remote attacker to cause a Denial of Service condition.
references
0
reference_url http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/
reference_id
reference_type
scores
url http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/
1
reference_url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
2
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html
8
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
9
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
10
reference_url http://marc.info/?l=bugtraq&m=136396549913849&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136396549913849&w=2
11
reference_url http://marc.info/?l=bugtraq&m=136432043316835&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136432043316835&w=2
12
reference_url http://marc.info/?l=bugtraq&m=136439120408139&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136439120408139&w=2
13
reference_url http://marc.info/?l=bugtraq&m=136733161405818&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=136733161405818&w=2
14
reference_url http://marc.info/?l=bugtraq&m=137545771702053&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=137545771702053&w=2
15
reference_url http://openwall.com/lists/oss-security/2013/02/05/24
reference_id
reference_type
scores
url http://openwall.com/lists/oss-security/2013/02/05/24
16
reference_url http://rhn.redhat.com/errata/RHSA-2013-0587.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0587.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2013-0782.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0782.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2013-0783.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0783.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2013-0833.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-0833.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2013-1455.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1455.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2013-1456.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2013-1456.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0169.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0169.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-0169
reference_id
reference_type
scores
0
value 0.00773
scoring_system epss
scoring_elements 0.73526
published_at 2026-04-01T12:55:00Z
1
value 0.00773
scoring_system epss
scoring_elements 0.73557
published_at 2026-04-04T12:55:00Z
2
value 0.00773
scoring_system epss
scoring_elements 0.73528
published_at 2026-04-07T12:55:00Z
3
value 0.00773
scoring_system epss
scoring_elements 0.73565
published_at 2026-04-08T12:55:00Z
4
value 0.00773
scoring_system epss
scoring_elements 0.73578
published_at 2026-04-09T12:55:00Z
5
value 0.00773
scoring_system epss
scoring_elements 0.73534
published_at 2026-04-02T12:55:00Z
6
value 0.00928
scoring_system epss
scoring_elements 0.76077
published_at 2026-04-12T12:55:00Z
7
value 0.00928
scoring_system epss
scoring_elements 0.76075
published_at 2026-04-13T12:55:00Z
8
value 0.00928
scoring_system epss
scoring_elements 0.76101
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-0169
24
reference_url https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
reference_id
reference_type
scores
url https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169
26
reference_url http://secunia.com/advisories/53623
reference_id
reference_type
scores
url http://secunia.com/advisories/53623
27
reference_url http://secunia.com/advisories/55108
reference_id
reference_type
scores
url http://secunia.com/advisories/55108
28
reference_url http://secunia.com/advisories/55139
reference_id
reference_type
scores
url http://secunia.com/advisories/55139
29
reference_url http://secunia.com/advisories/55322
reference_id
reference_type
scores
url http://secunia.com/advisories/55322
30
reference_url http://secunia.com/advisories/55350
reference_id
reference_type
scores
url http://secunia.com/advisories/55350
31
reference_url http://secunia.com/advisories/55351
reference_id
reference_type
scores
url http://secunia.com/advisories/55351
32
reference_url http://security.gentoo.org/glsa/glsa-201406-32.xml
reference_id
reference_type
scores
url http://security.gentoo.org/glsa/glsa-201406-32.xml
33
reference_url https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
reference_id
reference_type
scores
url https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html
34
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841
35
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016
36
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424
37
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540
38
reference_url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608
reference_id
reference_type
scores
url https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608
39
reference_url https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released
reference_id
reference_type
scores
url https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released
40
reference_url https://puppet.com/security/cve/cve-2013-0169
reference_id
reference_type
scores
url https://puppet.com/security/cve/cve-2013-0169
41
reference_url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
reference_id
reference_type
scores
url https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001
42
reference_url http://support.apple.com/kb/HT5880
reference_id
reference_type
scores
url http://support.apple.com/kb/HT5880
43
reference_url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084
reference_id
reference_type
scores
url https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084
44
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21644047
45
reference_url http://www.debian.org/security/2013/dsa-2621
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2621
46
reference_url http://www.debian.org/security/2013/dsa-2622
reference_id
reference_type
scores
url http://www.debian.org/security/2013/dsa-2622
47
reference_url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
reference_id
reference_type
scores
url http://www.isg.rhul.ac.uk/tls/TLStiming.pdf
48
reference_url http://www.kb.cert.org/vuls/id/737740
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/737740
49
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2013:095
50
reference_url http://www.matrixssl.org/news.html
reference_id
reference_type
scores
url http://www.matrixssl.org/news.html
51
reference_url http://www.openssl.org/news/secadv_20130204.txt
reference_id
reference_type
scores
url http://www.openssl.org/news/secadv_20130204.txt
52
reference_url http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html
53
reference_url http://www.securityfocus.com/bid/57778
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/57778
54
reference_url http://www.securitytracker.com/id/1029190
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1029190
55
reference_url http://www.splunk.com/view/SP-CAAAHXG
reference_id
reference_type
scores
url http://www.splunk.com/view/SP-CAAAHXG
56
reference_url http://www.ubuntu.com/usn/USN-1735-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-1735-1
57
reference_url http://www.us-cert.gov/cas/techalerts/TA13-051A.html
reference_id
reference_type
scores
url http://www.us-cert.gov/cas/techalerts/TA13-051A.html
58
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885
reference_id 699885
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885
59
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
reference_id 699888
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888
60
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889
reference_id 699889
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889
61
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=907589
reference_id 907589
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=907589
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*
111
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*
112
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*
113
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*
114
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*
115
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*
116
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*
117
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*
118
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*
119
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*
120
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*
121
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*
122
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*
123
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*
124
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*
125
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*
126
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*
127
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*
128
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*
129
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*
130
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*
131
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*
132
reference_url https://nvd.nist.gov/vuln/detail/CVE-2013-0169
reference_id CVE-2013-0169
reference_type
scores
0
value 2.6
scoring_system cvssv2
scoring_elements AV:N/AC:H/Au:N/C:P/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2013-0169
133
reference_url https://security.gentoo.org/glsa/201310-10
reference_id GLSA-201310-10
reference_type
scores
url https://security.gentoo.org/glsa/201310-10
134
reference_url https://security.gentoo.org/glsa/201312-03
reference_id GLSA-201312-03
reference_type
scores
url https://security.gentoo.org/glsa/201312-03
135
reference_url https://security.gentoo.org/glsa/201401-30
reference_id GLSA-201401-30
reference_type
scores
url https://security.gentoo.org/glsa/201401-30
136
reference_url https://security.gentoo.org/glsa/201406-32
reference_id GLSA-201406-32
reference_type
scores
url https://security.gentoo.org/glsa/201406-32
137
reference_url https://access.redhat.com/errata/RHSA-2013:0273
reference_id RHSA-2013:0273
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0273
138
reference_url https://access.redhat.com/errata/RHSA-2013:0274
reference_id RHSA-2013:0274
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0274
139
reference_url https://access.redhat.com/errata/RHSA-2013:0275
reference_id RHSA-2013:0275
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0275
140
reference_url https://access.redhat.com/errata/RHSA-2013:0531
reference_id RHSA-2013:0531
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0531
141
reference_url https://access.redhat.com/errata/RHSA-2013:0532
reference_id RHSA-2013:0532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0532
142
reference_url https://access.redhat.com/errata/RHSA-2013:0587
reference_id RHSA-2013:0587
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0587
143
reference_url https://access.redhat.com/errata/RHSA-2013:0636
reference_id RHSA-2013:0636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0636
144
reference_url https://access.redhat.com/errata/RHSA-2013:0782
reference_id RHSA-2013:0782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0782
145
reference_url https://access.redhat.com/errata/RHSA-2013:0783
reference_id RHSA-2013:0783
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0783
146
reference_url https://access.redhat.com/errata/RHSA-2013:0822
reference_id RHSA-2013:0822
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0822
147
reference_url https://access.redhat.com/errata/RHSA-2013:0823
reference_id RHSA-2013:0823
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0823
148
reference_url https://access.redhat.com/errata/RHSA-2013:0833
reference_id RHSA-2013:0833
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0833
149
reference_url https://access.redhat.com/errata/RHSA-2013:0855
reference_id RHSA-2013:0855
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:0855
150
reference_url https://access.redhat.com/errata/RHSA-2013:1013
reference_id RHSA-2013:1013
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1013
151
reference_url https://access.redhat.com/errata/RHSA-2013:1455
reference_id RHSA-2013:1455
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1455
152
reference_url https://access.redhat.com/errata/RHSA-2013:1456
reference_id RHSA-2013:1456
reference_type
scores
url https://access.redhat.com/errata/RHSA-2013:1456
153
reference_url https://access.redhat.com/errata/RHSA-2014:0416
reference_id RHSA-2014:0416
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0416
154
reference_url https://access.redhat.com/errata/RHSA-2020:4298
reference_id RHSA-2020:4298
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4298
155
reference_url https://usn.ubuntu.com/1732-1/
reference_id USN-1732-1
reference_type
scores
url https://usn.ubuntu.com/1732-1/
156
reference_url https://usn.ubuntu.com/1732-3/
reference_id USN-1732-3
reference_type
scores
url https://usn.ubuntu.com/1732-3/
157
reference_url https://usn.ubuntu.com/1735-1/
reference_id USN-1735-1
reference_type
scores
url https://usn.ubuntu.com/1735-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.0.22-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.0.22-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.0.22-3%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2013-0169
risk_score 1.1
exploitability 0.5
weighted_severity 2.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b1m6-r1bv-d7gr
19
url VCID-e5gr-ykye-9qb7
vulnerability_id VCID-e5gr-ykye-9qb7
summary gnutls: dane_query_tlsa() buffer overflow (GNUTLS-SA-2013-3)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4466.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4466
reference_id
reference_type
scores
0
value 0.00571
scoring_system epss
scoring_elements 0.6856
published_at 2026-04-01T12:55:00Z
1
value 0.00571
scoring_system epss
scoring_elements 0.68579
published_at 2026-04-02T12:55:00Z
2
value 0.00571
scoring_system epss
scoring_elements 0.68597
published_at 2026-04-04T12:55:00Z
3
value 0.00571
scoring_system epss
scoring_elements 0.68574
published_at 2026-04-07T12:55:00Z
4
value 0.00571
scoring_system epss
scoring_elements 0.68625
published_at 2026-04-13T12:55:00Z
5
value 0.00571
scoring_system epss
scoring_elements 0.68643
published_at 2026-04-09T12:55:00Z
6
value 0.00571
scoring_system epss
scoring_elements 0.68668
published_at 2026-04-11T12:55:00Z
7
value 0.00571
scoring_system epss
scoring_elements 0.68655
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4466
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1022913
reference_id 1022913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1022913
fixed_packages
0
url pkg:deb/debian/gnutls28@0?distro=trixie
purl pkg:deb/debian/gnutls28@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@0%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2013-4466
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5gr-ykye-9qb7
20
url VCID-egeh-jk4m-sba8
vulnerability_id VCID-egeh-jk4m-sba8
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2017-0574.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0574.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5337.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5337.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5337
reference_id
reference_type
scores
0
value 0.03732
scoring_system epss
scoring_elements 0.87943
published_at 2026-04-01T12:55:00Z
1
value 0.03732
scoring_system epss
scoring_elements 0.88
published_at 2026-04-13T12:55:00Z
2
value 0.03732
scoring_system epss
scoring_elements 0.87997
published_at 2026-04-09T12:55:00Z
3
value 0.03732
scoring_system epss
scoring_elements 0.88008
published_at 2026-04-11T12:55:00Z
4
value 0.03732
scoring_system epss
scoring_elements 0.88001
published_at 2026-04-12T12:55:00Z
5
value 0.03732
scoring_system epss
scoring_elements 0.87953
published_at 2026-04-02T12:55:00Z
6
value 0.03732
scoring_system epss
scoring_elements 0.87967
published_at 2026-04-04T12:55:00Z
7
value 0.03732
scoring_system epss
scoring_elements 0.8797
published_at 2026-04-07T12:55:00Z
8
value 0.03732
scoring_system epss
scoring_elements 0.87991
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5337
4
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=338
5
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=346
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/94fcf1645ea17223237aaf8d19132e004afddc1a
9
reference_url https://gnutls.org/security.html#GNUTLS-SA-2017-2
reference_id
reference_type
scores
url https://gnutls.org/security.html#GNUTLS-SA-2017-2
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/7
11
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/4
12
reference_url http://www.securityfocus.com/bid/95372
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95372
13
reference_url http://www.securitytracker.com/id/1037576
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037576
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411836
reference_id 1411836
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411836
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5337
reference_id CVE-2017-5337
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5337
27
reference_url https://security.gentoo.org/glsa/201702-04
reference_id GLSA-201702-04
reference_type
scores
url https://security.gentoo.org/glsa/201702-04
28
reference_url https://access.redhat.com/errata/RHSA-2017:0574
reference_id RHSA-2017:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0574
29
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
30
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2017-5337
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-egeh-jk4m-sba8
21
url VCID-f5c7-jcd9-67hj
vulnerability_id VCID-f5c7-jcd9-67hj
summary gnutls: GnuTLS: Denial of Service via excessive resource consumption during certificate verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14831.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14831.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14831
reference_id
reference_type
scores
0
value 0.00064
scoring_system epss
scoring_elements 0.19773
published_at 2026-04-07T12:55:00Z
1
value 0.00064
scoring_system epss
scoring_elements 0.19853
published_at 2026-04-08T12:55:00Z
2
value 0.00064
scoring_system epss
scoring_elements 0.19907
published_at 2026-04-09T12:55:00Z
3
value 0.00065
scoring_system epss
scoring_elements 0.20176
published_at 2026-04-13T12:55:00Z
4
value 0.00065
scoring_system epss
scoring_elements 0.2028
published_at 2026-04-11T12:55:00Z
5
value 0.00065
scoring_system epss
scoring_elements 0.20235
published_at 2026-04-12T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20961
published_at 2026-04-02T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.2102
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14831
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1773
reference_id 1773
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1773
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423177
reference_id 2423177
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2423177
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9
reference_id cpe:/a:redhat:ai_inference_server:3.2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ai_inference_server:3.2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
reference_id cpe:/a:redhat:ceph_storage:8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:8::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
reference_id cpe:/a:redhat:hummingbird:1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:hummingbird:1
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
reference_id cpe:/a:redhat:rhui:5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhui:5::el9
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
reference_id cpe:/o:redhat:enterprise_linux:10.1
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.1
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
reference_id cpe:/o:redhat:enterprise_linux_eus:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux_eus:10.0
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
reference_id cpe:/o:redhat:rhel_eus:9.6::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.6::baseos
27
reference_url https://access.redhat.com/security/cve/CVE-2025-14831
reference_id CVE-2025-14831
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/security/cve/CVE-2025-14831
28
reference_url https://access.redhat.com/errata/RHSA-2026:3477
reference_id RHSA-2026:3477
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:3477
29
reference_url https://access.redhat.com/errata/RHSA-2026:4188
reference_id RHSA-2026:4188
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4188
30
reference_url https://access.redhat.com/errata/RHSA-2026:4655
reference_id RHSA-2026:4655
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4655
31
reference_url https://access.redhat.com/errata/RHSA-2026:4943
reference_id RHSA-2026:4943
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:4943
32
reference_url https://access.redhat.com/errata/RHSA-2026:5585
reference_id RHSA-2026:5585
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:5585
33
reference_url https://access.redhat.com/errata/RHSA-2026:5606
reference_id RHSA-2026:5606
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:5606
34
reference_url https://access.redhat.com/errata/RHSA-2026:6618
reference_id RHSA-2026:6618
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6618
35
reference_url https://access.redhat.com/errata/RHSA-2026:6630
reference_id RHSA-2026:6630
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6630
36
reference_url https://access.redhat.com/errata/RHSA-2026:6737
reference_id RHSA-2026:6737
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6737
37
reference_url https://access.redhat.com/errata/RHSA-2026:6738
reference_id RHSA-2026:6738
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:6738
38
reference_url https://access.redhat.com/errata/RHSA-2026:7329
reference_id RHSA-2026:7329
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:7329
39
reference_url https://access.redhat.com/errata/RHSA-2026:7335
reference_id RHSA-2026:7335
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-09T15:25:49Z/
url https://access.redhat.com/errata/RHSA-2026:7335
40
reference_url https://usn.ubuntu.com/8043-1/
reference_id USN-8043-1
reference_type
scores
url https://usn.ubuntu.com/8043-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u9?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u9?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u9%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u6?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u6%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-1%3Fdistro=trixie
6
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2025-14831, GNUTLS-SA-2026-02-09-2
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f5c7-jcd9-67hj
22
url VCID-fybd-zwbt-23ad
vulnerability_id VCID-fybd-zwbt-23ad
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0294.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0294.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-0294
reference_id
reference_type
scores
0
value 0.00584
scoring_system epss
scoring_elements 0.68942
published_at 2026-04-01T12:55:00Z
1
value 0.00584
scoring_system epss
scoring_elements 0.68959
published_at 2026-04-07T12:55:00Z
2
value 0.00584
scoring_system epss
scoring_elements 0.68979
published_at 2026-04-04T12:55:00Z
3
value 0.00584
scoring_system epss
scoring_elements 0.69009
published_at 2026-04-08T12:55:00Z
4
value 0.00584
scoring_system epss
scoring_elements 0.69028
published_at 2026-04-09T12:55:00Z
5
value 0.00584
scoring_system epss
scoring_elements 0.6905
published_at 2026-04-11T12:55:00Z
6
value 0.00584
scoring_system epss
scoring_elements 0.69036
published_at 2026-04-12T12:55:00Z
7
value 0.00584
scoring_system epss
scoring_elements 0.69007
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-0294
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0282
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0294
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1196323
reference_id 1196323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1196323
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779428
reference_id 779428
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=779428
6
reference_url https://access.redhat.com/errata/RHSA-2015:1457
reference_id RHSA-2015:1457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1457
7
reference_url https://usn.ubuntu.com/2540-1/
reference_id USN-2540-1
reference_type
scores
url https://usn.ubuntu.com/2540-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.8-6?distro=trixie
purl pkg:deb/debian/gnutls28@3.3.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.8-6%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2015-0294
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fybd-zwbt-23ad
23
url VCID-gnaf-m1ea-j7g2
vulnerability_id VCID-gnaf-m1ea-j7g2
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8313.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8313.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-8313
reference_id
reference_type
scores
0
value 0.01064
scoring_system epss
scoring_elements 0.77619
published_at 2026-04-01T12:55:00Z
1
value 0.01064
scoring_system epss
scoring_elements 0.77626
published_at 2026-04-02T12:55:00Z
2
value 0.01064
scoring_system epss
scoring_elements 0.77653
published_at 2026-04-04T12:55:00Z
3
value 0.01064
scoring_system epss
scoring_elements 0.77636
published_at 2026-04-07T12:55:00Z
4
value 0.01064
scoring_system epss
scoring_elements 0.77664
published_at 2026-04-08T12:55:00Z
5
value 0.01064
scoring_system epss
scoring_elements 0.77669
published_at 2026-04-09T12:55:00Z
6
value 0.01064
scoring_system epss
scoring_elements 0.77695
published_at 2026-04-11T12:55:00Z
7
value 0.01064
scoring_system epss
scoring_elements 0.77679
published_at 2026-04-12T12:55:00Z
8
value 0.01064
scoring_system epss
scoring_elements 0.77678
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-8313
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8313
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1287572
reference_id 1287572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1287572
fixed_packages
0
url pkg:deb/debian/gnutls28@0?distro=trixie
purl pkg:deb/debian/gnutls28@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@0%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2015-8313
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gnaf-m1ea-j7g2
24
url VCID-gy9e-81rw-pug2
vulnerability_id VCID-gy9e-81rw-pug2
summary GnuTLS: Null pointer dereference in MD_UPDATE
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4209.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-4209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-4209
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56804
published_at 2026-04-01T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56898
published_at 2026-04-02T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56919
published_at 2026-04-04T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.56895
published_at 2026-04-07T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56947
published_at 2026-04-08T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.5695
published_at 2026-04-09T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56958
published_at 2026-04-11T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56938
published_at 2026-04-12T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56915
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-4209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044156
reference_id 2044156
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044156
5
reference_url https://usn.ubuntu.com/5550-1/
reference_id USN-5550-1
reference_type
scores
url https://usn.ubuntu.com/5550-1/
6
reference_url https://usn.ubuntu.com/5750-1/
reference_id USN-5750-1
reference_type
scores
url https://usn.ubuntu.com/5750-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.3-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.3-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.3-2%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2021-4209
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gy9e-81rw-pug2
25
url VCID-hycu-7x87-jkcf
vulnerability_id VCID-hycu-7x87-jkcf
summary gnutls: Heap corruption when generating key ID for ECC (GNUTLS-SA-2014-5)
references
0
reference_url http://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2014-11/msg00084.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2014-1846.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1846.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8564.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8564.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8564
reference_id
reference_type
scores
0
value 0.00695
scoring_system epss
scoring_elements 0.71904
published_at 2026-04-13T12:55:00Z
1
value 0.00695
scoring_system epss
scoring_elements 0.71866
published_at 2026-04-01T12:55:00Z
2
value 0.00695
scoring_system epss
scoring_elements 0.71874
published_at 2026-04-02T12:55:00Z
3
value 0.00695
scoring_system epss
scoring_elements 0.71892
published_at 2026-04-04T12:55:00Z
4
value 0.00695
scoring_system epss
scoring_elements 0.71864
published_at 2026-04-07T12:55:00Z
5
value 0.00695
scoring_system epss
scoring_elements 0.71903
published_at 2026-04-08T12:55:00Z
6
value 0.00695
scoring_system epss
scoring_elements 0.71914
published_at 2026-04-09T12:55:00Z
7
value 0.00695
scoring_system epss
scoring_elements 0.71938
published_at 2026-04-11T12:55:00Z
8
value 0.00695
scoring_system epss
scoring_elements 0.71921
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8564
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8564
5
reference_url http://secunia.com/advisories/59991
reference_id
reference_type
scores
url http://secunia.com/advisories/59991
6
reference_url http://secunia.com/advisories/62284
reference_id
reference_type
scores
url http://secunia.com/advisories/62284
7
reference_url http://secunia.com/advisories/62294
reference_id
reference_type
scores
url http://secunia.com/advisories/62294
8
reference_url http://www.ubuntu.com/usn/USN-2403-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2403-1
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1161443
reference_id 1161443
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1161443
10
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769154
reference_id 769154
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769154
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.20:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.21:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.22:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.23:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.24:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.25:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.26:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.27:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.10:*:*:*:*:*:*:*
72
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.11:*:*:*:*:*:*:*
73
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.12:*:*:*:*:*:*:*
74
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.12.1:*:*:*:*:*:*:*
75
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.13:*:*:*:*:*:*:*
76
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.14:*:*:*:*:*:*:*
77
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.15:*:*:*:*:*:*:*
78
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.16:*:*:*:*:*:*:*
79
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.17:*:*:*:*:*:*:*
80
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.18:*:*:*:*:*:*:*
81
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.19:*:*:*:*:*:*:*
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.0:-:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.0:pre0:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.2:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.3:*:*:*:*:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.4:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.5:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.6:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.7:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.8:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.3.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.3.9:*:*:*:*:*:*:*
102
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
103
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
104
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
105
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
106
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
107
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*
108
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
109
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
110
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-8564
reference_id CVE-2014-8564
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-8564
111
reference_url https://access.redhat.com/errata/RHSA-2014:1846
reference_id RHSA-2014:1846
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1846
112
reference_url https://usn.ubuntu.com/2403-1/
reference_id USN-2403-1
reference_type
scores
url https://usn.ubuntu.com/2403-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.8-4?distro=trixie
purl pkg:deb/debian/gnutls28@3.3.8-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.8-4%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2014-8564
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hycu-7x87-jkcf
26
url VCID-jxjc-vjdc-1yfj
vulnerability_id VCID-jxjc-vjdc-1yfj
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0361.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-0361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-0361
reference_id
reference_type
scores
0
value 0.03615
scoring_system epss
scoring_elements 0.87746
published_at 2026-04-02T12:55:00Z
1
value 0.03615
scoring_system epss
scoring_elements 0.87759
published_at 2026-04-04T12:55:00Z
2
value 0.03615
scoring_system epss
scoring_elements 0.87762
published_at 2026-04-07T12:55:00Z
3
value 0.03615
scoring_system epss
scoring_elements 0.87783
published_at 2026-04-08T12:55:00Z
4
value 0.03615
scoring_system epss
scoring_elements 0.8779
published_at 2026-04-09T12:55:00Z
5
value 0.03615
scoring_system epss
scoring_elements 0.87801
published_at 2026-04-11T12:55:00Z
6
value 0.03615
scoring_system epss
scoring_elements 0.87795
published_at 2026-04-12T12:55:00Z
7
value 0.03615
scoring_system epss
scoring_elements 0.87794
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-0361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0361
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2162596
reference_id 2162596
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2162596
5
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
6
reference_url https://access.redhat.com/errata/RHSA-2023:1141
reference_id RHSA-2023:1141
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1141
7
reference_url https://access.redhat.com/errata/RHSA-2023:1200
reference_id RHSA-2023:1200
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1200
8
reference_url https://access.redhat.com/errata/RHSA-2023:1569
reference_id RHSA-2023:1569
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1569
9
reference_url https://access.redhat.com/errata/RHSA-2023:3361
reference_id RHSA-2023:3361
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3361
10
reference_url https://usn.ubuntu.com/5901-1/
reference_id USN-5901-1
reference_type
scores
url https://usn.ubuntu.com/5901-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u3%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.8-5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.8-5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2023-0361
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jxjc-vjdc-1yfj
27
url VCID-k31b-6m7s-pffq
vulnerability_id VCID-k31b-6m7s-pffq
summary
A null pointer dereference in GnuTLS might allow attackers to cause
    a Denial of Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7507.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-7507.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-7507
reference_id
reference_type
scores
0
value 0.00518
scoring_system epss
scoring_elements 0.66662
published_at 2026-04-01T12:55:00Z
1
value 0.00518
scoring_system epss
scoring_elements 0.66741
published_at 2026-04-13T12:55:00Z
2
value 0.00518
scoring_system epss
scoring_elements 0.66784
published_at 2026-04-11T12:55:00Z
3
value 0.00518
scoring_system epss
scoring_elements 0.6677
published_at 2026-04-12T12:55:00Z
4
value 0.00518
scoring_system epss
scoring_elements 0.66702
published_at 2026-04-02T12:55:00Z
5
value 0.00518
scoring_system epss
scoring_elements 0.66728
published_at 2026-04-04T12:55:00Z
6
value 0.00518
scoring_system epss
scoring_elements 0.667
published_at 2026-04-07T12:55:00Z
7
value 0.00518
scoring_system epss
scoring_elements 0.66749
published_at 2026-04-08T12:55:00Z
8
value 0.00518
scoring_system epss
scoring_elements 0.66764
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-7507
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1454621
reference_id 1454621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1454621
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864560
reference_id 864560
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=864560
5
reference_url https://security.archlinux.org/ASA-201706-12
reference_id ASA-201706-12
reference_type
scores
url https://security.archlinux.org/ASA-201706-12
6
reference_url https://security.archlinux.org/ASA-201707-6
reference_id ASA-201707-6
reference_type
scores
url https://security.archlinux.org/ASA-201707-6
7
reference_url https://security.archlinux.org/AVG-294
reference_id AVG-294
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-294
8
reference_url https://security.archlinux.org/AVG-295
reference_id AVG-295
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-295
9
reference_url https://security.gentoo.org/glsa/201710-15
reference_id GLSA-201710-15
reference_type
scores
url https://security.gentoo.org/glsa/201710-15
10
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
11
reference_url https://usn.ubuntu.com/3318-1/
reference_id USN-3318-1
reference_type
scores
url https://usn.ubuntu.com/3318-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-6?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.8-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-6%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2017-7507
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k31b-6m7s-pffq
28
url VCID-k5vv-ts4z-j7g5
vulnerability_id VCID-k5vv-ts4z-j7g5
summary gnutls: Use after free in client_send_params in lib/ext/pre_shared_key.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20232.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
reference_id
reference_type
scores
0
value 0.00844
scoring_system epss
scoring_elements 0.74724
published_at 2026-04-01T12:55:00Z
1
value 0.00844
scoring_system epss
scoring_elements 0.74768
published_at 2026-04-13T12:55:00Z
2
value 0.00844
scoring_system epss
scoring_elements 0.74727
published_at 2026-04-02T12:55:00Z
3
value 0.00844
scoring_system epss
scoring_elements 0.74754
published_at 2026-04-04T12:55:00Z
4
value 0.00844
scoring_system epss
scoring_elements 0.74728
published_at 2026-04-07T12:55:00Z
5
value 0.00844
scoring_system epss
scoring_elements 0.7476
published_at 2026-04-08T12:55:00Z
6
value 0.00844
scoring_system epss
scoring_elements 0.74775
published_at 2026-04-09T12:55:00Z
7
value 0.00844
scoring_system epss
scoring_elements 0.74799
published_at 2026-04-11T12:55:00Z
8
value 0.00844
scoring_system epss
scoring_elements 0.74778
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20232
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20232
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
reference_id 1922275
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=1922275
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://security.netapp.com/advisory/ntap-20210416-0005/
reference_id ntap-20210416-0005
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://security.netapp.com/advisory/ntap-20210416-0005/
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
reference_id OSLAE6PP33A7VYRYMYMUVB3U6B26GZER
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OSLAE6PP33A7VYRYMYMUVB3U6B26GZER/
9
reference_url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_id r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r50661d6f0082709aad9a584431b59ec364f9974b63b07e0800230168%40%3Cissues.spark.apache.org%3E
10
reference_url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_id r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5d4001031e7790d8c6396c499522b4ed2aab782da87b1a14184793bb%40%3Cissues.spark.apache.org%3E
11
reference_url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_id r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r5f88bed447742fcc5c47bf1c7be965ef450131914a6e1f85feba2779%40%3Cissues.spark.apache.org%3E
12
reference_url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_id r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r6ac143ba6dd98bd4bf6bf010d46e56e254056459721ba18822d611f7%40%3Cissues.spark.apache.org%3E
13
reference_url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_id r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/r9cbc69e57276413788e90a6ee16c7c034ea4258d31935b70db2bd158%40%3Cissues.spark.apache.org%3E
14
reference_url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_id rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rcd70a4c88a47a75fd2d5f3ffb7cee8c2a18c713320bd90fdcb57495f%40%3Cissues.spark.apache.org%3E
15
reference_url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_id rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rf5e1256d870193def4a82ad89ab95e63943a313b5ff0d81aa87e4532%40%3Cissues.spark.apache.org%3E
16
reference_url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_id rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://lists.apache.org/thread.html/rfd5273d72d244178441e6904a2f2b41a3268f569e8092ea0b3b2bb20%40%3Cissues.spark.apache.org%3E
17
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
18
reference_url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
reference_id security-new.html#GNUTLS-SA-2021-03-10
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-12-03T15:03:27Z/
url https://www.gnutls.org/security-new.html#GNUTLS-SA-2021-03-10
19
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2021-20232
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k5vv-ts4z-j7g5
29
url VCID-m31f-a3pn-yyb4
vulnerability_id VCID-m31f-a3pn-yyb4
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2017-0574.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0574.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5335.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5335.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5335
reference_id
reference_type
scores
0
value 0.02671
scoring_system epss
scoring_elements 0.85741
published_at 2026-04-01T12:55:00Z
1
value 0.02671
scoring_system epss
scoring_elements 0.85815
published_at 2026-04-13T12:55:00Z
2
value 0.02671
scoring_system epss
scoring_elements 0.85808
published_at 2026-04-09T12:55:00Z
3
value 0.02671
scoring_system epss
scoring_elements 0.85823
published_at 2026-04-11T12:55:00Z
4
value 0.02671
scoring_system epss
scoring_elements 0.85819
published_at 2026-04-12T12:55:00Z
5
value 0.02671
scoring_system epss
scoring_elements 0.85754
published_at 2026-04-02T12:55:00Z
6
value 0.02671
scoring_system epss
scoring_elements 0.85773
published_at 2026-04-04T12:55:00Z
7
value 0.02671
scoring_system epss
scoring_elements 0.85778
published_at 2026-04-07T12:55:00Z
8
value 0.02671
scoring_system epss
scoring_elements 0.85797
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5335
4
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=337
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/49be4f7b82eba2363bb8d4090950dad976a77a3a
8
reference_url https://gnutls.org/security.html#GNUTLS-SA-2017-2
reference_id
reference_type
scores
url https://gnutls.org/security.html#GNUTLS-SA-2017-2
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/7
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/4
11
reference_url http://www.securityfocus.com/bid/95374
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95374
12
reference_url http://www.securitytracker.com/id/1037576
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037576
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1412235
reference_id 1412235
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1412235
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5335
reference_id CVE-2017-5335
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5335
26
reference_url https://security.gentoo.org/glsa/201702-04
reference_id GLSA-201702-04
reference_type
scores
url https://security.gentoo.org/glsa/201702-04
27
reference_url https://access.redhat.com/errata/RHSA-2017:0574
reference_id RHSA-2017:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0574
28
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
29
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2017-5335
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m31f-a3pn-yyb4
30
url VCID-mtvm-zj2z-m7gf
vulnerability_id VCID-mtvm-zj2z-m7gf
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
1
reference_url http://rhn.redhat.com/errata/RHSA-2017-0574.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2017-0574.html
2
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5336.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5336.json
3
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5336
reference_id
reference_type
scores
0
value 0.03948
scoring_system epss
scoring_elements 0.88295
published_at 2026-04-01T12:55:00Z
1
value 0.03948
scoring_system epss
scoring_elements 0.8835
published_at 2026-04-13T12:55:00Z
2
value 0.03948
scoring_system epss
scoring_elements 0.88341
published_at 2026-04-08T12:55:00Z
3
value 0.03948
scoring_system epss
scoring_elements 0.88347
published_at 2026-04-09T12:55:00Z
4
value 0.03948
scoring_system epss
scoring_elements 0.88358
published_at 2026-04-11T12:55:00Z
5
value 0.03948
scoring_system epss
scoring_elements 0.88303
published_at 2026-04-02T12:55:00Z
6
value 0.03948
scoring_system epss
scoring_elements 0.88317
published_at 2026-04-04T12:55:00Z
7
value 0.03948
scoring_system epss
scoring_elements 0.88322
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5336
4
reference_url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
reference_id
reference_type
scores
url https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=340
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/5140422e0d7319a8e2fe07f02cbcafc4d6538732
8
reference_url https://gnutls.org/security.html#GNUTLS-SA-2017-2
reference_id
reference_type
scores
url https://gnutls.org/security.html#GNUTLS-SA-2017-2
9
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/7
10
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/4
11
reference_url http://www.securityfocus.com/bid/95377
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95377
12
reference_url http://www.securitytracker.com/id/1037576
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037576
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1412236
reference_id 1412236
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1412236
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5336
reference_id CVE-2017-5336
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5336
26
reference_url https://security.gentoo.org/glsa/201702-04
reference_id GLSA-201702-04
reference_type
scores
url https://security.gentoo.org/glsa/201702-04
27
reference_url https://access.redhat.com/errata/RHSA-2017:0574
reference_id RHSA-2017:0574
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:0574
28
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
29
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2017-5336
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mtvm-zj2z-m7gf
31
url VCID-n2bt-m936-7kcr
vulnerability_id VCID-n2bt-m936-7kcr
summary
Multiple vulnerabilities have been discovered in GnuTLS, the worst
    of which could lead to arbitrary code execution.
references
0
reference_url http://lists.gnutls.org/pipermail/gnutls-help/2014-January/003326.html
reference_id
reference_type
scores
url http://lists.gnutls.org/pipermail/gnutls-help/2014-January/003326.html
1
reference_url http://lists.gnutls.org/pipermail/gnutls-help/2014-January/003327.html
reference_id
reference_type
scores
url http://lists.gnutls.org/pipermail/gnutls-help/2014-January/003327.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00007.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-06/msg00010.html
4
reference_url http://rhn.redhat.com/errata/RHSA-2014-0684.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-0684.html
5
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3465.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3465.json
6
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3465
reference_id
reference_type
scores
0
value 0.0063
scoring_system epss
scoring_elements 0.70284
published_at 2026-04-13T12:55:00Z
1
value 0.0063
scoring_system epss
scoring_elements 0.70219
published_at 2026-04-01T12:55:00Z
2
value 0.0063
scoring_system epss
scoring_elements 0.70232
published_at 2026-04-02T12:55:00Z
3
value 0.0063
scoring_system epss
scoring_elements 0.70249
published_at 2026-04-04T12:55:00Z
4
value 0.0063
scoring_system epss
scoring_elements 0.70226
published_at 2026-04-07T12:55:00Z
5
value 0.0063
scoring_system epss
scoring_elements 0.70272
published_at 2026-04-08T12:55:00Z
6
value 0.0063
scoring_system epss
scoring_elements 0.70287
published_at 2026-04-09T12:55:00Z
7
value 0.0063
scoring_system epss
scoring_elements 0.70311
published_at 2026-04-11T12:55:00Z
8
value 0.0063
scoring_system epss
scoring_elements 0.70297
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3465
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
8
reference_url http://secunia.com/advisories/59086
reference_id
reference_type
scores
url http://secunia.com/advisories/59086
9
reference_url https://www.gitorious.org/gnutls/gnutls/commit/d3648ebb04b650e6d20a2ec1fb839256b30b9fc6
reference_id
reference_type
scores
url https://www.gitorious.org/gnutls/gnutls/commit/d3648ebb04b650e6d20a2ec1fb839256b30b9fc6
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1101734
reference_id 1101734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1101734
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*
24
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*
25
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*
26
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*
27
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*
28
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*
29
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*
30
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*
31
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*
32
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*
33
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*
34
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*
35
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*
36
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*
37
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*
38
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*
39
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*
40
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*
41
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*
42
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*
43
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*
44
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*
45
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*
46
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*
47
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*
48
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*
49
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*
50
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*
51
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*
52
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*
53
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*
54
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*
55
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*
56
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*
57
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*
58
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*
59
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*
60
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*
61
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*
62
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*
63
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*
64
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*
65
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*
66
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*
67
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*
68
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*
69
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*
70
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*
71
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3465
reference_id CVE-2014-3465
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
url https://nvd.nist.gov/vuln/detail/CVE-2014-3465
72
reference_url https://security.gentoo.org/glsa/201406-09
reference_id GLSA-201406-09
reference_type
scores
url https://security.gentoo.org/glsa/201406-09
73
reference_url https://access.redhat.com/errata/RHSA-2014:0684
reference_id RHSA-2014:0684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0684
fixed_packages
0
url pkg:deb/debian/gnutls28@3.2.10-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.2.10-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.2.10-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2014-3465
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n2bt-m936-7kcr
32
url VCID-nce1-q8wc-s3ae
vulnerability_id VCID-nce1-q8wc-s3ae
summary
Multiple vulnerabilities have been fixed in GnuTLS, the worst of
    which can cause Denial of Service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3308.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-3308
reference_id
reference_type
scores
0
value 0.01394
scoring_system epss
scoring_elements 0.8033
published_at 2026-04-01T12:55:00Z
1
value 0.01394
scoring_system epss
scoring_elements 0.80336
published_at 2026-04-02T12:55:00Z
2
value 0.01394
scoring_system epss
scoring_elements 0.80356
published_at 2026-04-04T12:55:00Z
3
value 0.01394
scoring_system epss
scoring_elements 0.80345
published_at 2026-04-07T12:55:00Z
4
value 0.01394
scoring_system epss
scoring_elements 0.80374
published_at 2026-04-08T12:55:00Z
5
value 0.01394
scoring_system epss
scoring_elements 0.80385
published_at 2026-04-09T12:55:00Z
6
value 0.01394
scoring_system epss
scoring_elements 0.80403
published_at 2026-04-11T12:55:00Z
7
value 0.01394
scoring_system epss
scoring_elements 0.80388
published_at 2026-04-12T12:55:00Z
8
value 0.01394
scoring_system epss
scoring_elements 0.80381
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-3308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3308
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1212459
reference_id 1212459
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1212459
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782776
reference_id 782776
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782776
5
reference_url https://security.gentoo.org/glsa/201506-03
reference_id GLSA-201506-03
reference_type
scores
url https://security.gentoo.org/glsa/201506-03
6
reference_url https://usn.ubuntu.com/2727-1/
reference_id USN-2727-1
reference_type
scores
url https://usn.ubuntu.com/2727-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.8-7?distro=trixie
purl pkg:deb/debian/gnutls28@3.3.8-7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.8-7%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2015-3308
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nce1-q8wc-s3ae
33
url VCID-p6yt-pz69-xkd8
vulnerability_id VCID-p6yt-pz69-xkd8
summary security update
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3466.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3466.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3466
reference_id
reference_type
scores
0
value 0.13715
scoring_system epss
scoring_elements 0.94225
published_at 2026-04-01T12:55:00Z
1
value 0.13715
scoring_system epss
scoring_elements 0.94234
published_at 2026-04-02T12:55:00Z
2
value 0.13715
scoring_system epss
scoring_elements 0.94246
published_at 2026-04-04T12:55:00Z
3
value 0.13715
scoring_system epss
scoring_elements 0.94247
published_at 2026-04-07T12:55:00Z
4
value 0.13715
scoring_system epss
scoring_elements 0.94256
published_at 2026-04-08T12:55:00Z
5
value 0.13715
scoring_system epss
scoring_elements 0.9426
published_at 2026-04-09T12:55:00Z
6
value 0.13715
scoring_system epss
scoring_elements 0.94265
published_at 2026-04-12T12:55:00Z
7
value 0.13715
scoring_system epss
scoring_elements 0.94266
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3466
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1101932
reference_id 1101932
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1101932
4
reference_url https://security.gentoo.org/glsa/201406-09
reference_id GLSA-201406-09
reference_type
scores
url https://security.gentoo.org/glsa/201406-09
5
reference_url https://access.redhat.com/errata/RHSA-2014:0594
reference_id RHSA-2014:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0594
6
reference_url https://access.redhat.com/errata/RHSA-2014:0595
reference_id RHSA-2014:0595
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0595
7
reference_url https://access.redhat.com/errata/RHSA-2014:0684
reference_id RHSA-2014:0684
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0684
8
reference_url https://access.redhat.com/errata/RHSA-2014:0815
reference_id RHSA-2014:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0815
9
reference_url https://usn.ubuntu.com/2229-1/
reference_id USN-2229-1
reference_type
scores
url https://usn.ubuntu.com/2229-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.2.15-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.2.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.2.15-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2014-3466
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p6yt-pz69-xkd8
34
url VCID-pe4z-zett-mbff
vulnerability_id VCID-pe4z-zett-mbff
summary gnutls: gnutls does not perform date/time checks on CA certificates
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8155.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8155.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-8155
reference_id
reference_type
scores
0
value 0.00286
scoring_system epss
scoring_elements 0.51976
published_at 2026-04-01T12:55:00Z
1
value 0.00286
scoring_system epss
scoring_elements 0.52024
published_at 2026-04-02T12:55:00Z
2
value 0.00286
scoring_system epss
scoring_elements 0.5205
published_at 2026-04-04T12:55:00Z
3
value 0.00286
scoring_system epss
scoring_elements 0.52016
published_at 2026-04-07T12:55:00Z
4
value 0.00286
scoring_system epss
scoring_elements 0.5207
published_at 2026-04-08T12:55:00Z
5
value 0.00286
scoring_system epss
scoring_elements 0.52066
published_at 2026-04-09T12:55:00Z
6
value 0.00286
scoring_system epss
scoring_elements 0.52118
published_at 2026-04-11T12:55:00Z
7
value 0.00286
scoring_system epss
scoring_elements 0.52101
published_at 2026-04-12T12:55:00Z
8
value 0.00286
scoring_system epss
scoring_elements 0.52086
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-8155
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1197995
reference_id 1197995
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1197995
3
reference_url https://access.redhat.com/errata/RHSA-2015:1457
reference_id RHSA-2015:1457
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1457
4
reference_url https://usn.ubuntu.com/2540-1/
reference_id USN-2540-1
reference_type
scores
url https://usn.ubuntu.com/2540-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@0?distro=trixie
purl pkg:deb/debian/gnutls28@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@0%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2014-8155
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pe4z-zett-mbff
35
url VCID-pf5n-65mk-2ff3
vulnerability_id VCID-pf5n-65mk-2ff3
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32990.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32990.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32990
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.2197
published_at 2026-04-02T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22023
published_at 2026-04-04T12:55:00Z
2
value 0.0008
scoring_system epss
scoring_elements 0.23645
published_at 2026-04-11T12:55:00Z
3
value 0.0008
scoring_system epss
scoring_elements 0.23603
published_at 2026-04-12T12:55:00Z
4
value 0.0008
scoring_system epss
scoring_elements 0.23546
published_at 2026-04-13T12:55:00Z
5
value 0.0008
scoring_system epss
scoring_elements 0.23512
published_at 2026-04-07T12:55:00Z
6
value 0.0008
scoring_system epss
scoring_elements 0.23583
published_at 2026-04-08T12:55:00Z
7
value 0.0008
scoring_system epss
scoring_elements 0.23628
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32990
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32990
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359620
reference_id 2359620
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359620
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2025-32990
reference_id CVE-2025-32990
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/security/cve/CVE-2025-32990
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:16115
23
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:16116
24
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17181
25
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17348
26
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17361
27
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:17415
28
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:19088
29
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-10T14:06:53Z/
url https://access.redhat.com/errata/RHSA-2025:22529
30
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
31
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2025-32990, GNUTLS-SA-2025-07-08-3
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pf5n-65mk-2ff3
36
url VCID-q3g5-4xaf-hudf
vulnerability_id VCID-q3g5-4xaf-hudf
summary gnutls: "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10846.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10846
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02447
published_at 2026-04-01T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02515
published_at 2026-04-02T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02529
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.0253
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02534
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02555
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02523
published_at 2026-04-12T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02522
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582574
reference_id 1582574
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582574
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.19-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.19-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2018-10846
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3g5-4xaf-hudf
37
url VCID-qp8x-339r-pbhe
vulnerability_id VCID-qp8x-339r-pbhe
summary gnutls: Bleichenbacher-like side channel leakage in PKCS#1 v1.5 verification and padding oracle verification
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16868.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16868.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-16868
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.12801
published_at 2026-04-01T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12899
published_at 2026-04-02T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.12949
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12752
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12832
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12883
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12849
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12811
published_at 2026-04-12T12:55:00Z
8
value 0.00042
scoring_system epss
scoring_elements 0.12766
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-16868
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16868
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1654929
reference_id 1654929
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1654929
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.5-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.6.5-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.5-2%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2018-16868
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qp8x-339r-pbhe
38
url VCID-qtsh-kn2d-h7cr
vulnerability_id VCID-qtsh-kn2d-h7cr
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28835.json
reference_id
reference_type
scores
0
value 5.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-28835.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-28835
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10874
published_at 2026-04-04T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10776
published_at 2026-04-08T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.107
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1081
published_at 2026-04-02T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13197
published_at 2026-04-13T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13317
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13284
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13246
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-28835
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28835
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
reference_id 004845.html
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067463
reference_id 1067463
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1067463
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269084
reference_id 2269084
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2269084
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
15
reference_url https://access.redhat.com/security/cve/CVE-2024-28835
reference_id CVE-2024-28835
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/security/cve/CVE-2024-28835
16
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
17
reference_url https://access.redhat.com/errata/RHSA-2024:1879
reference_id RHSA-2024:1879
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:1879
18
reference_url https://access.redhat.com/errata/RHSA-2024:2570
reference_id RHSA-2024:2570
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:2570
19
reference_url https://access.redhat.com/errata/RHSA-2024:2889
reference_id RHSA-2024:2889
reference_type
scores
0
value 5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T18:00:08Z/
url https://access.redhat.com/errata/RHSA-2024:2889
20
reference_url https://usn.ubuntu.com/6733-1/
reference_id USN-6733-1
reference_type
scores
url https://usn.ubuntu.com/6733-1/
21
reference_url https://usn.ubuntu.com/6733-2/
reference_id USN-6733-2
reference_type
scores
url https://usn.ubuntu.com/6733-2/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u6?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u6%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u3?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u3%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.4-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.4-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.4-2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2024-28835, GNUTLS-SA-2024-01-23
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtsh-kn2d-h7cr
39
url VCID-qup9-qy11-fqhe
vulnerability_id VCID-qup9-qy11-fqhe
summary
Multiple vulnerabilities have been found in mbed TLS, the worst of
    which could lead to the remote execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00038.html
1
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00041.html
2
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00042.html
3
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00043.html
4
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00044.html
5
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00045.html
6
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00047.html
7
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00048.html
8
reference_url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2015-12/msg00139.html
9
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00005.html
10
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00058.html
11
reference_url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-01/msg00059.html
12
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00007.html
13
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00008.html
14
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00101.html
15
reference_url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-updates/2016-02/msg00166.html
16
reference_url http://rhn.redhat.com/errata/RHSA-2016-0049.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0049.html
17
reference_url http://rhn.redhat.com/errata/RHSA-2016-0050.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0050.html
18
reference_url http://rhn.redhat.com/errata/RHSA-2016-0053.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0053.html
19
reference_url http://rhn.redhat.com/errata/RHSA-2016-0054.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0054.html
20
reference_url http://rhn.redhat.com/errata/RHSA-2016-0055.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0055.html
21
reference_url http://rhn.redhat.com/errata/RHSA-2016-0056.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2016-0056.html
22
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7575.json
23
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
reference_id
reference_type
scores
0
value 0.01509
scoring_system epss
scoring_elements 0.81189
published_at 2026-04-13T12:55:00Z
1
value 0.01509
scoring_system epss
scoring_elements 0.81125
published_at 2026-04-01T12:55:00Z
2
value 0.01509
scoring_system epss
scoring_elements 0.81184
published_at 2026-04-08T12:55:00Z
3
value 0.01509
scoring_system epss
scoring_elements 0.8119
published_at 2026-04-09T12:55:00Z
4
value 0.01509
scoring_system epss
scoring_elements 0.8121
published_at 2026-04-11T12:55:00Z
5
value 0.01509
scoring_system epss
scoring_elements 0.81196
published_at 2026-04-12T12:55:00Z
6
value 0.01509
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-02T12:55:00Z
7
value 0.01509
scoring_system epss
scoring_elements 0.81157
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-7575
24
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4881
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950
55
reference_url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
reference_id
reference_type
scores
url https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
56
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
57
reference_url https://security.netapp.com/advisory/ntap-20160225-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20160225-0001/
58
reference_url http://www.debian.org/security/2016/dsa-3436
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3436
59
reference_url http://www.debian.org/security/2016/dsa-3437
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3437
60
reference_url http://www.debian.org/security/2016/dsa-3457
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3457
61
reference_url http://www.debian.org/security/2016/dsa-3458
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3458
62
reference_url http://www.debian.org/security/2016/dsa-3465
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3465
63
reference_url http://www.debian.org/security/2016/dsa-3491
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3491
64
reference_url http://www.debian.org/security/2016/dsa-3688
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3688
65
reference_url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
reference_id
reference_type
scores
url http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
66
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
67
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
68
reference_url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
69
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
70
reference_url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
71
reference_url http://www.securityfocus.com/bid/79684
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/79684
72
reference_url http://www.securityfocus.com/bid/91787
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/91787
73
reference_url http://www.securitytracker.com/id/1034541
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1034541
74
reference_url http://www.securitytracker.com/id/1036467
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1036467
75
reference_url http://www.ubuntu.com/usn/USN-2863-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2863-1
76
reference_url http://www.ubuntu.com/usn/USN-2864-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2864-1
77
reference_url http://www.ubuntu.com/usn/USN-2865-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2865-1
78
reference_url http://www.ubuntu.com/usn/USN-2866-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2866-1
79
reference_url http://www.ubuntu.com/usn/USN-2884-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2884-1
80
reference_url http://www.ubuntu.com/usn/USN-2904-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2904-1
81
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
reference_id 1289841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1289841
82
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*
83
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*
84
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*
85
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*
86
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*
87
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.1.1:*:*:*:*:*:*:*
88
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.0:*:*:*:*:*:*:*
89
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.2.1:*:*:*:*:*:*:*
90
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.3.0:*:*:*:*:*:*:*
91
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.4.0:*:*:*:*:*:*:*
92
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.0:*:*:*:*:*:*:*
93
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:firefox:38.5.1:*:*:*:*:*:*:*
94
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:mozilla:network_security_services:*:*:*:*:*:*:*:*
95
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
96
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*
97
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_id cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*
98
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
99
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
100
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
101
reference_url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
reference_id CVE-2015-7575
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:N
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2015-7575
102
reference_url https://security.gentoo.org/glsa/201605-06
reference_id GLSA-201605-06
reference_type
scores
url https://security.gentoo.org/glsa/201605-06
103
reference_url https://security.gentoo.org/glsa/201701-46
reference_id GLSA-201701-46
reference_type
scores
url https://security.gentoo.org/glsa/201701-46
104
reference_url https://security.gentoo.org/glsa/201706-18
reference_id GLSA-201706-18
reference_type
scores
url https://security.gentoo.org/glsa/201706-18
105
reference_url https://security.gentoo.org/glsa/201801-15
reference_id GLSA-201801-15
reference_type
scores
url https://security.gentoo.org/glsa/201801-15
106
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
reference_id mfsa2015-150
reference_type
scores
0
value none
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2015-150
107
reference_url https://access.redhat.com/errata/RHSA-2016:0007
reference_id RHSA-2016:0007
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0007
108
reference_url https://access.redhat.com/errata/RHSA-2016:0008
reference_id RHSA-2016:0008
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0008
109
reference_url https://access.redhat.com/errata/RHSA-2016:0012
reference_id RHSA-2016:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0012
110
reference_url https://access.redhat.com/errata/RHSA-2016:0049
reference_id RHSA-2016:0049
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0049
111
reference_url https://access.redhat.com/errata/RHSA-2016:0050
reference_id RHSA-2016:0050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0050
112
reference_url https://access.redhat.com/errata/RHSA-2016:0053
reference_id RHSA-2016:0053
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0053
113
reference_url https://access.redhat.com/errata/RHSA-2016:0054
reference_id RHSA-2016:0054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0054
114
reference_url https://access.redhat.com/errata/RHSA-2016:0055
reference_id RHSA-2016:0055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0055
115
reference_url https://access.redhat.com/errata/RHSA-2016:0056
reference_id RHSA-2016:0056
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0056
116
reference_url https://access.redhat.com/errata/RHSA-2016:0098
reference_id RHSA-2016:0098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0098
117
reference_url https://access.redhat.com/errata/RHSA-2016:0099
reference_id RHSA-2016:0099
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0099
118
reference_url https://access.redhat.com/errata/RHSA-2016:0100
reference_id RHSA-2016:0100
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0100
119
reference_url https://access.redhat.com/errata/RHSA-2016:0101
reference_id RHSA-2016:0101
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:0101
120
reference_url https://access.redhat.com/errata/RHSA-2016:1430
reference_id RHSA-2016:1430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2016:1430
121
reference_url https://usn.ubuntu.com/2863-1/
reference_id USN-2863-1
reference_type
scores
url https://usn.ubuntu.com/2863-1/
122
reference_url https://usn.ubuntu.com/2864-1/
reference_id USN-2864-1
reference_type
scores
url https://usn.ubuntu.com/2864-1/
123
reference_url https://usn.ubuntu.com/2865-1/
reference_id USN-2865-1
reference_type
scores
url https://usn.ubuntu.com/2865-1/
124
reference_url https://usn.ubuntu.com/2866-1/
reference_id USN-2866-1
reference_type
scores
url https://usn.ubuntu.com/2866-1/
125
reference_url https://usn.ubuntu.com/2884-1/
reference_id USN-2884-1
reference_type
scores
url https://usn.ubuntu.com/2884-1/
126
reference_url https://usn.ubuntu.com/2904-1/
reference_id USN-2904-1
reference_type
scores
url https://usn.ubuntu.com/2904-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.15-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.3.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.15-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2015-7575
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qup9-qy11-fqhe
40
url VCID-r531-qbtt-akgf
vulnerability_id VCID-r531-qbtt-akgf
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which could result in a Denial of Service condition.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00017.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3836.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-3836.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2019-3836
reference_id
reference_type
scores
0
value 0.00362
scoring_system epss
scoring_elements 0.5817
published_at 2026-04-01T12:55:00Z
1
value 0.00362
scoring_system epss
scoring_elements 0.58286
published_at 2026-04-13T12:55:00Z
2
value 0.00362
scoring_system epss
scoring_elements 0.58251
published_at 2026-04-07T12:55:00Z
3
value 0.00362
scoring_system epss
scoring_elements 0.58304
published_at 2026-04-08T12:55:00Z
4
value 0.00362
scoring_system epss
scoring_elements 0.5831
published_at 2026-04-09T12:55:00Z
5
value 0.00362
scoring_system epss
scoring_elements 0.58329
published_at 2026-04-11T12:55:00Z
6
value 0.00362
scoring_system epss
scoring_elements 0.58306
published_at 2026-04-12T12:55:00Z
7
value 0.00362
scoring_system epss
scoring_elements 0.58256
published_at 2026-04-02T12:55:00Z
8
value 0.00362
scoring_system epss
scoring_elements 0.58276
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2019-3836
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836
reference_id
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3836
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://gitlab.com/gnutls/gnutls/issues/704
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/issues/704
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
reference_id
reference_type
scores
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A3ETBUFBB4G7AITAOUYPGXVMBGVXKUAN/
8
reference_url https://security.netapp.com/advisory/ntap-20190502-0005/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20190502-0005/
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1678411
reference_id 1678411
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1678411
10
reference_url https://security.archlinux.org/ASA-201904-2
reference_id ASA-201904-2
reference_type
scores
url https://security.archlinux.org/ASA-201904-2
11
reference_url https://security.archlinux.org/AVG-945
reference_id AVG-945
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-945
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/detail/CVE-2019-3836
reference_id CVE-2019-3836
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:N/I:N/A:P
1
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
2
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2019-3836
16
reference_url https://security.gentoo.org/glsa/201904-14
reference_id GLSA-201904-14
reference_type
scores
url https://security.gentoo.org/glsa/201904-14
17
reference_url https://access.redhat.com/errata/RHSA-2019:3600
reference_id RHSA-2019:3600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2019:3600
18
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.7-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.6.7-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.7-2%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2019-3836
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r531-qbtt-akgf
41
url VCID-sp9u-9wwg-b7e9
vulnerability_id VCID-sp9u-9wwg-b7e9
summary
A flaw was found in GnuTLS, possibly allowing a Denial of Service
    condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24659.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-24659.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-24659
reference_id
reference_type
scores
0
value 0.03633
scoring_system epss
scoring_elements 0.87779
published_at 2026-04-01T12:55:00Z
1
value 0.03633
scoring_system epss
scoring_elements 0.87789
published_at 2026-04-02T12:55:00Z
2
value 0.03633
scoring_system epss
scoring_elements 0.878
published_at 2026-04-04T12:55:00Z
3
value 0.03633
scoring_system epss
scoring_elements 0.87804
published_at 2026-04-07T12:55:00Z
4
value 0.03633
scoring_system epss
scoring_elements 0.87826
published_at 2026-04-08T12:55:00Z
5
value 0.03633
scoring_system epss
scoring_elements 0.87832
published_at 2026-04-09T12:55:00Z
6
value 0.03633
scoring_system epss
scoring_elements 0.87844
published_at 2026-04-11T12:55:00Z
7
value 0.03633
scoring_system epss
scoring_elements 0.87838
published_at 2026-04-12T12:55:00Z
8
value 0.03633
scoring_system epss
scoring_elements 0.87837
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-24659
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24659
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1872021
reference_id 1872021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1872021
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969547
reference_id 969547
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=969547
6
reference_url https://security.gentoo.org/glsa/202009-01
reference_id GLSA-202009-01
reference_type
scores
url https://security.gentoo.org/glsa/202009-01
7
reference_url https://access.redhat.com/errata/RHSA-2020:5483
reference_id RHSA-2020:5483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:5483
8
reference_url https://usn.ubuntu.com/4491-1/
reference_id USN-4491-1
reference_type
scores
url https://usn.ubuntu.com/4491-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.6.15-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.6.15-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.6.15-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2020-24659, GNUTLS-SA-2020-09-04
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sp9u-9wwg-b7e9
42
url VCID-styg-c5gm-kqgb
vulnerability_id VCID-styg-c5gm-kqgb
summary gnutls: incorrect handling of V1 intermediate certificates
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5138.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-5138.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-5138
reference_id
reference_type
scores
0
value 0.00847
scoring_system epss
scoring_elements 0.74845
published_at 2026-04-12T12:55:00Z
1
value 0.00847
scoring_system epss
scoring_elements 0.74836
published_at 2026-04-13T12:55:00Z
2
value 0.01369
scoring_system epss
scoring_elements 0.80184
published_at 2026-04-04T12:55:00Z
3
value 0.01369
scoring_system epss
scoring_elements 0.80172
published_at 2026-04-07T12:55:00Z
4
value 0.01369
scoring_system epss
scoring_elements 0.80157
published_at 2026-04-01T12:55:00Z
5
value 0.01369
scoring_system epss
scoring_elements 0.80209
published_at 2026-04-09T12:55:00Z
6
value 0.01369
scoring_system epss
scoring_elements 0.80228
published_at 2026-04-11T12:55:00Z
7
value 0.01369
scoring_system epss
scoring_elements 0.802
published_at 2026-04-08T12:55:00Z
8
value 0.01369
scoring_system epss
scoring_elements 0.80164
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-5138
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1069301
reference_id 1069301
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1069301
3
reference_url https://access.redhat.com/errata/RHSA-2014:0247
reference_id RHSA-2014:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0247
fixed_packages
0
url pkg:deb/debian/gnutls28@0?distro=trixie
purl pkg:deb/debian/gnutls28@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@0%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2009-5138
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-styg-c5gm-kqgb
43
url VCID-t6s4-uw76-7kf9
vulnerability_id VCID-t6s4-uw76-7kf9
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32989.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32989.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32989
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33666
published_at 2026-04-02T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33699
published_at 2026-04-04T12:55:00Z
2
value 0.00141
scoring_system epss
scoring_elements 0.34333
published_at 2026-04-11T12:55:00Z
3
value 0.00141
scoring_system epss
scoring_elements 0.34293
published_at 2026-04-12T12:55:00Z
4
value 0.00141
scoring_system epss
scoring_elements 0.34269
published_at 2026-04-13T12:55:00Z
5
value 0.00141
scoring_system epss
scoring_elements 0.34259
published_at 2026-04-07T12:55:00Z
6
value 0.00141
scoring_system epss
scoring_elements 0.34302
published_at 2026-04-08T12:55:00Z
7
value 0.00141
scoring_system epss
scoring_elements 0.34332
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32989
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359621
reference_id 2359621
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359621
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
18
reference_url https://access.redhat.com/security/cve/CVE-2025-32989
reference_id CVE-2025-32989
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://access.redhat.com/security/cve/CVE-2025-32989
19
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
20
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://access.redhat.com/errata/RHSA-2025:16115
21
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://access.redhat.com/errata/RHSA-2025:16116
22
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://access.redhat.com/errata/RHSA-2025:17181
23
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://access.redhat.com/errata/RHSA-2025:17348
24
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://access.redhat.com/errata/RHSA-2025:17361
25
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://access.redhat.com/errata/RHSA-2025:19088
26
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:51Z/
url https://access.redhat.com/errata/RHSA-2025:22529
27
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@0?distro=trixie
purl pkg:deb/debian/gnutls28@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@0%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2025-32989, GNUTLS-SA-2025-07-08-1
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6s4-uw76-7kf9
44
url VCID-tbbc-ga1r-nfah
vulnerability_id VCID-tbbc-ga1r-nfah
summary certificate verification flaw
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1959.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1959.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1959
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.4569
published_at 2026-04-01T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45759
published_at 2026-04-02T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.4578
published_at 2026-04-13T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45729
published_at 2026-04-07T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45786
published_at 2026-04-08T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45783
published_at 2026-04-09T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45805
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45775
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1959
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1959
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1065092
reference_id 1065092
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1065092
4
reference_url https://security.gentoo.org/glsa/201406-09
reference_id GLSA-201406-09
reference_type
scores
url https://security.gentoo.org/glsa/201406-09
5
reference_url https://usn.ubuntu.com/2121-1/
reference_id USN-2121-1
reference_type
scores
url https://usn.ubuntu.com/2121-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.2.11-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.2.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.2.11-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2014-1959
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tbbc-ga1r-nfah
45
url VCID-uc8j-r79v-n7ck
vulnerability_id VCID-uc8j-r79v-n7ck
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32988.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-32988.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-32988
reference_id
reference_type
scores
0
value 0.00053
scoring_system epss
scoring_elements 0.16932
published_at 2026-04-04T12:55:00Z
1
value 0.00053
scoring_system epss
scoring_elements 0.16875
published_at 2026-04-02T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19034
published_at 2026-04-13T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.18994
published_at 2026-04-07T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19074
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19127
published_at 2026-04-09T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19133
published_at 2026-04-11T12:55:00Z
7
value 0.00061
scoring_system epss
scoring_elements 0.19087
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-32988
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32988
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
reference_id 004883.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2025-July/004883.html
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359622
reference_id 2359622
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2359622
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
21
reference_url https://access.redhat.com/security/cve/CVE-2025-32988
reference_id CVE-2025-32988
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/security/cve/CVE-2025-32988
22
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
23
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:16115
24
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:16116
25
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17181
26
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17348
27
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17361
28
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:17415
29
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:19088
30
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T20:04:19Z/
url https://access.redhat.com/errata/RHSA-2025:22529
31
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
32
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2025-32988, GNUTLS-SA-2025-07-08-2
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uc8j-r79v-n7ck
46
url VCID-uws5-j79f-cbar
vulnerability_id VCID-uws5-j79f-cbar
summary gnutls: Use after free in client key_share extension
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
reference_id
reference_type
scores
0
value 3.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20231.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
reference_id
reference_type
scores
0
value 0.00917
scoring_system epss
scoring_elements 0.75866
published_at 2026-04-01T12:55:00Z
1
value 0.00917
scoring_system epss
scoring_elements 0.75882
published_at 2026-04-07T12:55:00Z
2
value 0.00917
scoring_system epss
scoring_elements 0.75902
published_at 2026-04-04T12:55:00Z
3
value 0.00917
scoring_system epss
scoring_elements 0.75915
published_at 2026-04-08T12:55:00Z
4
value 0.00917
scoring_system epss
scoring_elements 0.75928
published_at 2026-04-09T12:55:00Z
5
value 0.00917
scoring_system epss
scoring_elements 0.75951
published_at 2026-04-11T12:55:00Z
6
value 0.00917
scoring_system epss
scoring_elements 0.7587
published_at 2026-04-02T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78876
published_at 2026-04-13T12:55:00Z
8
value 0.01195
scoring_system epss
scoring_elements 0.78885
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-20231
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20231
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
reference_id 1922276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1922276
5
reference_url https://security.archlinux.org/ASA-202103-1
reference_id ASA-202103-1
reference_type
scores
url https://security.archlinux.org/ASA-202103-1
6
reference_url https://security.archlinux.org/AVG-1674
reference_id AVG-1674
reference_type
scores
0
value Low
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1674
7
reference_url https://access.redhat.com/errata/RHSA-2021:4451
reference_id RHSA-2021:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4451
8
reference_url https://usn.ubuntu.com/5029-1/
reference_id USN-5029-1
reference_type
scores
url https://usn.ubuntu.com/5029-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2021-20231, GNUTLS-SA-2021-03-10
risk_score 1.9
exploitability 0.5
weighted_severity 3.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uws5-j79f-cbar
47
url VCID-vz27-wyaf-tkcr
vulnerability_id VCID-vz27-wyaf-tkcr
summary gnutls: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10845.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10845.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10845
reference_id
reference_type
scores
0
value 0.00565
scoring_system epss
scoring_elements 0.68422
published_at 2026-04-13T12:55:00Z
1
value 0.01038
scoring_system epss
scoring_elements 0.7735
published_at 2026-04-01T12:55:00Z
2
value 0.01038
scoring_system epss
scoring_elements 0.77356
published_at 2026-04-02T12:55:00Z
3
value 0.01038
scoring_system epss
scoring_elements 0.77383
published_at 2026-04-04T12:55:00Z
4
value 0.01038
scoring_system epss
scoring_elements 0.77364
published_at 2026-04-07T12:55:00Z
5
value 0.01038
scoring_system epss
scoring_elements 0.77393
published_at 2026-04-08T12:55:00Z
6
value 0.01038
scoring_system epss
scoring_elements 0.77403
published_at 2026-04-09T12:55:00Z
7
value 0.01038
scoring_system epss
scoring_elements 0.77429
published_at 2026-04-11T12:55:00Z
8
value 0.01038
scoring_system epss
scoring_elements 0.77409
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10845
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582572
reference_id 1582572
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582572
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.19-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.19-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2018-10845
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vz27-wyaf-tkcr
48
url VCID-w7f6-5b6h-8kh4
vulnerability_id VCID-w7f6-5b6h-8kh4
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to a denial of service.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0567.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-0567.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0567
reference_id
reference_type
scores
0
value 0.01605
scoring_system epss
scoring_elements 0.8172
published_at 2026-04-13T12:55:00Z
1
value 0.01605
scoring_system epss
scoring_elements 0.81668
published_at 2026-04-02T12:55:00Z
2
value 0.01605
scoring_system epss
scoring_elements 0.81691
published_at 2026-04-04T12:55:00Z
3
value 0.01605
scoring_system epss
scoring_elements 0.81688
published_at 2026-04-07T12:55:00Z
4
value 0.01605
scoring_system epss
scoring_elements 0.81715
published_at 2026-04-08T12:55:00Z
5
value 0.01605
scoring_system epss
scoring_elements 0.81719
published_at 2026-04-09T12:55:00Z
6
value 0.01605
scoring_system epss
scoring_elements 0.81739
published_at 2026-04-11T12:55:00Z
7
value 0.01605
scoring_system epss
scoring_elements 0.81727
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0567
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0567
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
reference_id 004841.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html
5
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061045
reference_id 1061045
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1061045
6
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1521
reference_id 1521
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1521
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2258544
reference_id 2258544
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2258544
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
reference_id cpe:/a:redhat:logging:5.8::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:logging:5.8::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
reference_id cpe:/a:redhat:openshift:3.11
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:3.11
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_id cpe:/a:redhat:openshift_data_foundation:4.15::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift_data_foundation:4.15::el9
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
reference_id cpe:/a:redhat:rhel_eus:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.2::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
reference_id cpe:/o:redhat:enterprise_linux:8
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
reference_id cpe:/o:redhat:enterprise_linux:9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
reference_id cpe:/o:redhat:rhel_eus:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.2::baseos
19
reference_url https://access.redhat.com/security/cve/CVE-2024-0567
reference_id CVE-2024-0567
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/security/cve/CVE-2024-0567
20
reference_url https://security.gentoo.org/glsa/202411-06
reference_id GLSA-202411-06
reference_type
scores
url https://security.gentoo.org/glsa/202411-06
21
reference_url https://access.redhat.com/errata/RHSA-2024:0533
reference_id RHSA-2024:0533
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:0533
22
reference_url https://access.redhat.com/errata/RHSA-2024:1082
reference_id RHSA-2024:1082
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:1082
23
reference_url https://access.redhat.com/errata/RHSA-2024:1383
reference_id RHSA-2024:1383
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:1383
24
reference_url https://access.redhat.com/errata/RHSA-2024:2094
reference_id RHSA-2024:2094
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-08T18:37:07Z/
url https://access.redhat.com/errata/RHSA-2024:2094
25
reference_url https://usn.ubuntu.com/6593-1/
reference_id USN-6593-1
reference_type
scores
url https://usn.ubuntu.com/6593-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u2%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.3-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.3-1%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2024-0567
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w7f6-5b6h-8kh4
49
url VCID-wqyp-93bk-vbh2
vulnerability_id VCID-wqyp-93bk-vbh2
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6395.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6395.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6395
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20371
published_at 2026-04-02T12:55:00Z
1
value 0.00065
scoring_system epss
scoring_elements 0.20432
published_at 2026-04-04T12:55:00Z
2
value 0.00073
scoring_system epss
scoring_elements 0.22175
published_at 2026-04-11T12:55:00Z
3
value 0.00073
scoring_system epss
scoring_elements 0.22135
published_at 2026-04-12T12:55:00Z
4
value 0.00073
scoring_system epss
scoring_elements 0.22075
published_at 2026-04-13T12:55:00Z
5
value 0.00073
scoring_system epss
scoring_elements 0.22021
published_at 2026-04-07T12:55:00Z
6
value 0.00073
scoring_system epss
scoring_elements 0.22101
published_at 2026-04-08T12:55:00Z
7
value 0.00073
scoring_system epss
scoring_elements 0.22156
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6395
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6395
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2376755
reference_id 2376755
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2376755
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
reference_id cpe:/a:redhat:ceph_storage:7::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:ceph_storage:7::el9
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
reference_id cpe:/a:redhat:discovery:2::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:2::el9
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
reference_id cpe:/a:redhat:insights_proxy:1.5::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:insights_proxy:1.5::el9
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
reference_id cpe:/o:redhat:enterprise_linux:10.0
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10.0
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2025-6395
reference_id CVE-2025-6395
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/security/cve/CVE-2025-6395
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:16115
reference_id RHSA-2025:16115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:16115
23
reference_url https://access.redhat.com/errata/RHSA-2025:16116
reference_id RHSA-2025:16116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:16116
24
reference_url https://access.redhat.com/errata/RHSA-2025:17181
reference_id RHSA-2025:17181
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17181
25
reference_url https://access.redhat.com/errata/RHSA-2025:17348
reference_id RHSA-2025:17348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17348
26
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17361
27
reference_url https://access.redhat.com/errata/RHSA-2025:17415
reference_id RHSA-2025:17415
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:17415
28
reference_url https://access.redhat.com/errata/RHSA-2025:19088
reference_id RHSA-2025:19088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:19088
29
reference_url https://access.redhat.com/errata/RHSA-2025:22529
reference_id RHSA-2025:22529
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-10T15:32:33Z/
url https://access.redhat.com/errata/RHSA-2025:22529
30
reference_url https://usn.ubuntu.com/7635-1/
reference_id USN-7635-1
reference_type
scores
url https://usn.ubuntu.com/7635-1/
31
reference_url https://usn.ubuntu.com/7742-1/
reference_id USN-7742-1
reference_type
scores
url https://usn.ubuntu.com/7742-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u8?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u8?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u8%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2025-6395, GNUTLS-SA-2025-07-08-4
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wqyp-93bk-vbh2
50
url VCID-wukx-qzcx-8qfv
vulnerability_id VCID-wukx-qzcx-8qfv
summary gnutls: DTLS plaintext recovery attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0390.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0390.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-0390
reference_id
reference_type
scores
0
value 0.00262
scoring_system epss
scoring_elements 0.49491
published_at 2026-04-01T12:55:00Z
1
value 0.00262
scoring_system epss
scoring_elements 0.49522
published_at 2026-04-02T12:55:00Z
2
value 0.00262
scoring_system epss
scoring_elements 0.49549
published_at 2026-04-04T12:55:00Z
3
value 0.00262
scoring_system epss
scoring_elements 0.49502
published_at 2026-04-07T12:55:00Z
4
value 0.00262
scoring_system epss
scoring_elements 0.49557
published_at 2026-04-08T12:55:00Z
5
value 0.00262
scoring_system epss
scoring_elements 0.49552
published_at 2026-04-09T12:55:00Z
6
value 0.00262
scoring_system epss
scoring_elements 0.49569
published_at 2026-04-11T12:55:00Z
7
value 0.00262
scoring_system epss
scoring_elements 0.4954
published_at 2026-04-12T12:55:00Z
8
value 0.00262
scoring_system epss
scoring_elements 0.49542
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-0390
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=772132
reference_id 772132
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=772132
fixed_packages
0
url pkg:deb/debian/gnutls28@3.0.11-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.0.11-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.0.11-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2012-0390
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wukx-qzcx-8qfv
51
url VCID-x5jd-qddc-eudq
vulnerability_id VCID-x5jd-qddc-eudq
summary Multiple vulnerabilities have been discovered in GnuTLS, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12243.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12243.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-12243
reference_id
reference_type
scores
0
value 0.01689
scoring_system epss
scoring_elements 0.82223
published_at 2026-04-13T12:55:00Z
1
value 0.01689
scoring_system epss
scoring_elements 0.82166
published_at 2026-04-02T12:55:00Z
2
value 0.01689
scoring_system epss
scoring_elements 0.82187
published_at 2026-04-04T12:55:00Z
3
value 0.01689
scoring_system epss
scoring_elements 0.82183
published_at 2026-04-07T12:55:00Z
4
value 0.01689
scoring_system epss
scoring_elements 0.82209
published_at 2026-04-08T12:55:00Z
5
value 0.01689
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-09T12:55:00Z
6
value 0.01689
scoring_system epss
scoring_elements 0.82236
published_at 2026-04-11T12:55:00Z
7
value 0.01689
scoring_system epss
scoring_elements 0.82228
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-12243
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12243
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://gitlab.com/gnutls/gnutls/-/issues/1553
reference_id 1553
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://gitlab.com/gnutls/gnutls/-/issues/1553
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344615
reference_id 2344615
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2344615
6
reference_url https://gitlab.com/gnutls/libtasn1/-/issues/52
reference_id 52
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://gitlab.com/gnutls/libtasn1/-/issues/52
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9
reference_id cpe:/a:redhat:discovery:1.14::el9
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
reference_id cpe:/a:redhat:openshift:4
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
reference_id cpe:/o:redhat:enterprise_linux:10
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
reference_id cpe:/o:redhat:enterprise_linux:8::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
reference_id cpe:/o:redhat:enterprise_linux:9::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_id cpe:/o:redhat:rhel_e4s:9.2::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
reference_id cpe:/o:redhat:rhel_eus:9.4::baseos
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos
20
reference_url https://access.redhat.com/security/cve/CVE-2024-12243
reference_id CVE-2024-12243
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/security/cve/CVE-2024-12243
21
reference_url https://security.gentoo.org/glsa/202509-08
reference_id GLSA-202509-08
reference_type
scores
url https://security.gentoo.org/glsa/202509-08
22
reference_url https://access.redhat.com/errata/RHSA-2025:17361
reference_id RHSA-2025:17361
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:17361
23
reference_url https://access.redhat.com/errata/RHSA-2025:4051
reference_id RHSA-2025:4051
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:4051
24
reference_url https://access.redhat.com/errata/RHSA-2025:7076
reference_id RHSA-2025:7076
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:7076
25
reference_url https://access.redhat.com/errata/RHSA-2025:8020
reference_id RHSA-2025:8020
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:8020
26
reference_url https://access.redhat.com/errata/RHSA-2025:8385
reference_id RHSA-2025:8385
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:20Z/
url https://access.redhat.com/errata/RHSA-2025:8385
27
reference_url https://usn.ubuntu.com/7281-1/
reference_id USN-7281-1
reference_type
scores
url https://usn.ubuntu.com/7281-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u7?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u7?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u7%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u4?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u4%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.9-2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-2%3Fdistro=trixie
5
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
6
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2024-12243, GNUTLS-SA-2025-02-07
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5jd-qddc-eudq
52
url VCID-xap5-djda-2uem
vulnerability_id VCID-xap5-djda-2uem
summary
Multiple vulnerabilities have been found in Oracle JRE/JDK,
    allowing both local and remote attackers to compromise various Java
    components.
references
0
reference_url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
reference_id
reference_type
scores
url ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2014-015.txt.asc
1
reference_url http://advisories.mageia.org/MGASA-2014-0416.html
reference_id
reference_type
scores
url http://advisories.mageia.org/MGASA-2014-0416.html
2
reference_url http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
reference_id
reference_type
scores
url http://aix.software.ibm.com/aix/efixes/security/openssl_advisory11.asc
3
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
4
reference_url http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
reference_id
reference_type
scores
url http://archives.neohapsis.com/archives/bugtraq/2014-10/0103.html
5
reference_url http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
reference_id
reference_type
scores
url http://askubuntu.com/questions/537196/how-do-i-patch-workaround-sslv3-poodle-vulnerability-cve-2014-3566
6
reference_url http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
reference_id
reference_type
scores
url http://blog.cryptographyengineering.com/2014/10/attack-of-week-poodle.html
7
reference_url http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
reference_id
reference_type
scores
url http://blog.nodejs.org/2014/10/23/node-v0-10-33-stable/
8
reference_url http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
reference_id
reference_type
scores
url http://blogs.technet.com/b/msrc/archive/2014/10/14/security-advisory-3009008-released.aspx
9
reference_url http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
reference_id
reference_type
scores
url http://docs.ipswitch.com/MOVEit/DMZ82/ReleaseNotes/MOVEitReleaseNotes82.pdf
10
reference_url http://downloads.asterisk.org/pub/security/AST-2014-011.html
reference_id
reference_type
scores
url http://downloads.asterisk.org/pub/security/AST-2014-011.html
11
reference_url http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
reference_id
reference_type
scores
url http://googleonlinesecurity.blogspot.com/2014/10/this-poodle-bites-exploiting-ssl-30.html
12
reference_url http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
reference_id
reference_type
scores
url http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581
13
reference_url http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
reference_id
reference_type
scores
url http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04779034
14
reference_url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
reference_id
reference_type
scores
url http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
15
reference_url http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Jan/msg00003.html
16
reference_url http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
reference_id
reference_type
scores
url http://lists.apple.com/archives/security-announce/2015/Sep/msg00002.html
17
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-November/142330.html
18
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141114.html
19
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2014-October/141158.html
20
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169361.html
21
reference_url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
reference_id
reference_type
scores
url http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169374.html
22
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00008.html
23
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00001.html
24
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00003.html
25
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html
26
reference_url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html
27
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html
28
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html
29
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html
30
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html
31
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html
32
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html
33
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html
34
reference_url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html
35
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html
36
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00066.html
37
reference_url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00000.html
38
reference_url http://marc.info/?l=bugtraq&m=141450452204552&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141450452204552&w=2
39
reference_url http://marc.info/?l=bugtraq&m=141450973807288&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141450973807288&w=2
40
reference_url http://marc.info/?l=bugtraq&m=141477196830952&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141477196830952&w=2
41
reference_url http://marc.info/?l=bugtraq&m=141576815022399&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141576815022399&w=2
42
reference_url http://marc.info/?l=bugtraq&m=141577087123040&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141577087123040&w=2
43
reference_url http://marc.info/?l=bugtraq&m=141577350823734&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141577350823734&w=2
44
reference_url http://marc.info/?l=bugtraq&m=141620103726640&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141620103726640&w=2
45
reference_url http://marc.info/?l=bugtraq&m=141628688425177&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141628688425177&w=2
46
reference_url http://marc.info/?l=bugtraq&m=141694355519663&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141694355519663&w=2
47
reference_url http://marc.info/?l=bugtraq&m=141697638231025&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141697638231025&w=2
48
reference_url http://marc.info/?l=bugtraq&m=141697676231104&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141697676231104&w=2
49
reference_url http://marc.info/?l=bugtraq&m=141703183219781&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141703183219781&w=2
50
reference_url http://marc.info/?l=bugtraq&m=141715130023061&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141715130023061&w=2
51
reference_url http://marc.info/?l=bugtraq&m=141775427104070&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141775427104070&w=2
52
reference_url http://marc.info/?l=bugtraq&m=141813976718456&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141813976718456&w=2
53
reference_url http://marc.info/?l=bugtraq&m=141814011518700&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141814011518700&w=2
54
reference_url http://marc.info/?l=bugtraq&m=141879378918327&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=141879378918327&w=2
55
reference_url http://marc.info/?l=bugtraq&m=142103967620673&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142103967620673&w=2
56
reference_url http://marc.info/?l=bugtraq&m=142118135300698&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142118135300698&w=2
57
reference_url http://marc.info/?l=bugtraq&m=142296755107581&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142296755107581&w=2
58
reference_url http://marc.info/?l=bugtraq&m=142350196615714&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350196615714&w=2
59
reference_url http://marc.info/?l=bugtraq&m=142350298616097&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350298616097&w=2
60
reference_url http://marc.info/?l=bugtraq&m=142350743917559&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142350743917559&w=2
61
reference_url http://marc.info/?l=bugtraq&m=142354438527235&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142354438527235&w=2
62
reference_url http://marc.info/?l=bugtraq&m=142357976805598&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142357976805598&w=2
63
reference_url http://marc.info/?l=bugtraq&m=142495837901899&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142495837901899&w=2
64
reference_url http://marc.info/?l=bugtraq&m=142496355704097&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142496355704097&w=2
65
reference_url http://marc.info/?l=bugtraq&m=142546741516006&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142546741516006&w=2
66
reference_url http://marc.info/?l=bugtraq&m=142607790919348&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142607790919348&w=2
67
reference_url http://marc.info/?l=bugtraq&m=142624590206005&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624590206005&w=2
68
reference_url http://marc.info/?l=bugtraq&m=142624619906067
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624619906067
69
reference_url http://marc.info/?l=bugtraq&m=142624619906067&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624619906067&w=2
70
reference_url http://marc.info/?l=bugtraq&m=142624679706236&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624679706236&w=2
71
reference_url http://marc.info/?l=bugtraq&m=142624719706349&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142624719706349&w=2
72
reference_url http://marc.info/?l=bugtraq&m=142660345230545&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142660345230545&w=2
73
reference_url http://marc.info/?l=bugtraq&m=142721830231196&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142721830231196&w=2
74
reference_url http://marc.info/?l=bugtraq&m=142721887231400&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142721887231400&w=2
75
reference_url http://marc.info/?l=bugtraq&m=142740155824959&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142740155824959&w=2
76
reference_url http://marc.info/?l=bugtraq&m=142791032306609&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142791032306609&w=2
77
reference_url http://marc.info/?l=bugtraq&m=142804214608580&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142804214608580&w=2
78
reference_url http://marc.info/?l=bugtraq&m=142805027510172&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142805027510172&w=2
79
reference_url http://marc.info/?l=bugtraq&m=142962817202793&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=142962817202793&w=2
80
reference_url http://marc.info/?l=bugtraq&m=143039249603103&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143039249603103&w=2
81
reference_url http://marc.info/?l=bugtraq&m=143101048219218&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143101048219218&w=2
82
reference_url http://marc.info/?l=bugtraq&m=143290371927178&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290371927178&w=2
83
reference_url http://marc.info/?l=bugtraq&m=143290437727362&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290437727362&w=2
84
reference_url http://marc.info/?l=bugtraq&m=143290522027658&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290522027658&w=2
85
reference_url http://marc.info/?l=bugtraq&m=143290583027876&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143290583027876&w=2
86
reference_url http://marc.info/?l=bugtraq&m=143558137709884&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143558137709884&w=2
87
reference_url http://marc.info/?l=bugtraq&m=143558192010071&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143558192010071&w=2
88
reference_url http://marc.info/?l=bugtraq&m=143628269912142&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=143628269912142&w=2
89
reference_url http://marc.info/?l=bugtraq&m=144101915224472&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144101915224472&w=2
90
reference_url http://marc.info/?l=bugtraq&m=144251162130364&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144251162130364&w=2
91
reference_url http://marc.info/?l=bugtraq&m=144294141001552&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=144294141001552&w=2
92
reference_url http://marc.info/?l=bugtraq&m=145983526810210&w=2
reference_id
reference_type
scores
url http://marc.info/?l=bugtraq&m=145983526810210&w=2
93
reference_url http://marc.info/?l=openssl-dev&m=141333049205629&w=2
reference_id
reference_type
scores
url http://marc.info/?l=openssl-dev&m=141333049205629&w=2
94
reference_url http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
reference_id
reference_type
scores
url http://people.canonical.com/~ubuntu-security/cve/2014/CVE-2014-3566.html
95
reference_url http://rhn.redhat.com/errata/RHSA-2014-1652.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1652.html
96
reference_url http://rhn.redhat.com/errata/RHSA-2014-1653.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1653.html
97
reference_url http://rhn.redhat.com/errata/RHSA-2014-1692.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1692.html
98
reference_url http://rhn.redhat.com/errata/RHSA-2014-1876.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1876.html
99
reference_url http://rhn.redhat.com/errata/RHSA-2014-1877.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1877.html
100
reference_url http://rhn.redhat.com/errata/RHSA-2014-1880.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1880.html
101
reference_url http://rhn.redhat.com/errata/RHSA-2014-1881.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1881.html
102
reference_url http://rhn.redhat.com/errata/RHSA-2014-1882.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1882.html
103
reference_url http://rhn.redhat.com/errata/RHSA-2014-1920.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1920.html
104
reference_url http://rhn.redhat.com/errata/RHSA-2014-1948.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2014-1948.html
105
reference_url http://rhn.redhat.com/errata/RHSA-2015-0068.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0068.html
106
reference_url http://rhn.redhat.com/errata/RHSA-2015-0079.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0079.html
107
reference_url http://rhn.redhat.com/errata/RHSA-2015-0080.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0080.html
108
reference_url http://rhn.redhat.com/errata/RHSA-2015-0085.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0085.html
109
reference_url http://rhn.redhat.com/errata/RHSA-2015-0086.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0086.html
110
reference_url http://rhn.redhat.com/errata/RHSA-2015-0264.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0264.html
111
reference_url http://rhn.redhat.com/errata/RHSA-2015-0698.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-0698.html
112
reference_url http://rhn.redhat.com/errata/RHSA-2015-1545.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1545.html
113
reference_url http://rhn.redhat.com/errata/RHSA-2015-1546.html
reference_id
reference_type
scores
url http://rhn.redhat.com/errata/RHSA-2015-1546.html
114
reference_url https://access.redhat.com/articles/1232123
reference_id
reference_type
scores
url https://access.redhat.com/articles/1232123
115
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3566.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3566.json
116
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3566
reference_id
reference_type
scores
0
value 0.94015
scoring_system epss
scoring_elements 0.99894
published_at 2026-04-02T12:55:00Z
1
value 0.94015
scoring_system epss
scoring_elements 0.99895
published_at 2026-04-11T12:55:00Z
2
value 0.94015
scoring_system epss
scoring_elements 0.99896
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3566
117
reference_url https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
reference_id
reference_type
scores
url https://blog.mozilla.org/security/2014/10/14/the-poodle-attack-and-the-end-of-ssl-3-0/
118
reference_url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
reference_id
reference_type
scores
url https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_openssl6
119
reference_url https://bto.bluecoat.com/security-advisory/sa83
reference_id
reference_type
scores
url https://bto.bluecoat.com/security-advisory/sa83
120
reference_url https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
reference_id
reference_type
scores
url https://bugzilla.mozilla.org/show_bug.cgi?id=1076983
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601
134
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383
135
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395
136
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407
137
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408
138
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410
139
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412
140
reference_url https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
reference_id
reference_type
scores
url https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
141
reference_url http://secunia.com/advisories/59627
reference_id
reference_type
scores
url http://secunia.com/advisories/59627
142
reference_url http://secunia.com/advisories/60056
reference_id
reference_type
scores
url http://secunia.com/advisories/60056
143
reference_url http://secunia.com/advisories/60206
reference_id
reference_type
scores
url http://secunia.com/advisories/60206
144
reference_url http://secunia.com/advisories/60792
reference_id
reference_type
scores
url http://secunia.com/advisories/60792
145
reference_url http://secunia.com/advisories/60859
reference_id
reference_type
scores
url http://secunia.com/advisories/60859
146
reference_url http://secunia.com/advisories/61019
reference_id
reference_type
scores
url http://secunia.com/advisories/61019
147
reference_url http://secunia.com/advisories/61130
reference_id
reference_type
scores
url http://secunia.com/advisories/61130
148
reference_url http://secunia.com/advisories/61303
reference_id
reference_type
scores
url http://secunia.com/advisories/61303
149
reference_url http://secunia.com/advisories/61316
reference_id
reference_type
scores
url http://secunia.com/advisories/61316
150
reference_url http://secunia.com/advisories/61345
reference_id
reference_type
scores
url http://secunia.com/advisories/61345
151
reference_url http://secunia.com/advisories/61359
reference_id
reference_type
scores
url http://secunia.com/advisories/61359
152
reference_url http://secunia.com/advisories/61782
reference_id
reference_type
scores
url http://secunia.com/advisories/61782
153
reference_url http://secunia.com/advisories/61810
reference_id
reference_type
scores
url http://secunia.com/advisories/61810
154
reference_url http://secunia.com/advisories/61819
reference_id
reference_type
scores
url http://secunia.com/advisories/61819
155
reference_url http://secunia.com/advisories/61825
reference_id
reference_type
scores
url http://secunia.com/advisories/61825
156
reference_url http://secunia.com/advisories/61827
reference_id
reference_type
scores
url http://secunia.com/advisories/61827
157
reference_url http://secunia.com/advisories/61926
reference_id
reference_type
scores
url http://secunia.com/advisories/61926
158
reference_url http://secunia.com/advisories/61995
reference_id
reference_type
scores
url http://secunia.com/advisories/61995
159
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.8
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:P/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
160
reference_url https://github.com/mpgn/poodle-PoC
reference_id
reference_type
scores
url https://github.com/mpgn/poodle-PoC
161
reference_url https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
reference_id
reference_type
scores
url https://groups.google.com/forum/#%21topic/docker-user/oYm0i3xShJU
162
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04819635
163
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068681
164
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05157667
165
reference_url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
reference_id
reference_type
scores
url https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05301946
166
reference_url https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
reference_id
reference_type
scores
url https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02
167
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10090
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10090
168
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10091
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10091
169
reference_url https://kc.mcafee.com/corporate/index?page=content&id=SB10104
reference_id
reference_type
scores
url https://kc.mcafee.com/corporate/index?page=content&id=SB10104
170
reference_url https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf%40%3Ccommits.cxf.apache.org%3E
171
reference_url https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc78eb0764f2c84a2b96470a0187315c%40%3Ccommits.cxf.apache.org%3E
172
reference_url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6%40%3Ccommits.cxf.apache.org%3E
173
reference_url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rec7160382badd3ef4ad017a22f64a266c7188b9ba71394f0d321e2d4%40%3Ccommits.cxf.apache.org%3E
174
reference_url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rfb87e0bf3995e7d560afeed750fac9329ff5f1ad49da365129b7f89e%40%3Ccommits.cxf.apache.org%3E
175
reference_url https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
reference_id
reference_type
scores
url https://lists.apache.org/thread.html/rff42cfa5e7d75b7c1af0e37589140a8f1999e578a75738740b244bd4%40%3Ccommits.cxf.apache.org%3E
176
reference_url https://puppet.com/security/cve/poodle-sslv3-vulnerability
reference_id
reference_type
scores
url https://puppet.com/security/cve/poodle-sslv3-vulnerability
177
reference_url https://security.netapp.com/advisory/ntap-20141015-0001/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20141015-0001/
178
reference_url https://support.apple.com/HT205217
reference_id
reference_type
scores
url https://support.apple.com/HT205217
179
reference_url https://support.apple.com/kb/HT6527
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6527
180
reference_url https://support.apple.com/kb/HT6529
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6529
181
reference_url https://support.apple.com/kb/HT6531
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6531
182
reference_url https://support.apple.com/kb/HT6535
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6535
183
reference_url https://support.apple.com/kb/HT6536
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6536
184
reference_url https://support.apple.com/kb/HT6541
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6541
185
reference_url https://support.apple.com/kb/HT6542
reference_id
reference_type
scores
url https://support.apple.com/kb/HT6542
186
reference_url https://support.citrix.com/article/CTX216642
reference_id
reference_type
scores
url https://support.citrix.com/article/CTX216642
187
reference_url https://support.lenovo.com/product_security/poodle
reference_id
reference_type
scores
url https://support.lenovo.com/product_security/poodle
188
reference_url https://support.lenovo.com/us/en/product_security/poodle
reference_id
reference_type
scores
url https://support.lenovo.com/us/en/product_security/poodle
189
reference_url https://technet.microsoft.com/library/security/3009008.aspx
reference_id
reference_type
scores
url https://technet.microsoft.com/library/security/3009008.aspx
190
reference_url https://templatelab.com/ssl-poodle/
reference_id
reference_type
scores
url https://templatelab.com/ssl-poodle/
191
reference_url http://support.apple.com/HT204244
reference_id
reference_type
scores
url http://support.apple.com/HT204244
192
reference_url http://support.citrix.com/article/CTX200238
reference_id
reference_type
scores
url http://support.citrix.com/article/CTX200238
193
reference_url https://www-01.ibm.com/support/docview.wss?uid=swg21688165
reference_id
reference_type
scores
url https://www-01.ibm.com/support/docview.wss?uid=swg21688165
194
reference_url https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
reference_id
reference_type
scores
url https://www.arista.com/en/support/advisories-notices/security-advisories/1015-security-advisory-7
195
reference_url https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
reference_id
reference_type
scores
url https://www.cloudera.com/documentation/other/security-bulletins/topics/csb_topic_1.html
196
reference_url https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
reference_id
reference_type
scores
url https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html
197
reference_url https://www.elastic.co/blog/logstash-1-4-3-released
reference_id
reference_type
scores
url https://www.elastic.co/blog/logstash-1-4-3-released
198
reference_url https://www.imperialviolet.org/2014/10/14/poodle.html
reference_id
reference_type
scores
url https://www.imperialviolet.org/2014/10/14/poodle.html
199
reference_url https://www.openssl.org/~bodo/ssl-poodle.pdf
reference_id
reference_type
scores
url https://www.openssl.org/~bodo/ssl-poodle.pdf
200
reference_url https://www.openssl.org/news/secadv_20141015.txt
reference_id
reference_type
scores
url https://www.openssl.org/news/secadv_20141015.txt
201
reference_url https://www.suse.com/support/kb/doc.php?id=7015773
reference_id
reference_type
scores
url https://www.suse.com/support/kb/doc.php?id=7015773
202
reference_url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
reference_id
reference_type
scores
url http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20141015-poodle
203
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021431
204
reference_url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=isg3T1021439
205
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21686997
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21686997
206
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21687172
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21687172
207
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21687611
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21687611
208
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21688283
209
reference_url http://www-01.ibm.com/support/docview.wss?uid=swg21692299
reference_id
reference_type
scores
url http://www-01.ibm.com/support/docview.wss?uid=swg21692299
210
reference_url http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
reference_id
reference_type
scores
url http://www1.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-405500.htm
211
reference_url http://www.debian.org/security/2014/dsa-3053
reference_id
reference_type
scores
url http://www.debian.org/security/2014/dsa-3053
212
reference_url http://www.debian.org/security/2015/dsa-3144
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3144
213
reference_url http://www.debian.org/security/2015/dsa-3147
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3147
214
reference_url http://www.debian.org/security/2015/dsa-3253
reference_id
reference_type
scores
url http://www.debian.org/security/2015/dsa-3253
215
reference_url http://www.debian.org/security/2016/dsa-3489
reference_id
reference_type
scores
url http://www.debian.org/security/2016/dsa-3489
216
reference_url http://www.kb.cert.org/vuls/id/577193
reference_id
reference_type
scores
url http://www.kb.cert.org/vuls/id/577193
217
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2014:203
218
reference_url http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
reference_id
reference_type
scores
url http://www.mandriva.com/security/advisories?name=MDVSA-2015:062
219
reference_url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
220
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
221
reference_url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
222
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
223
reference_url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
224
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
225
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
226
reference_url http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
227
reference_url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
228
reference_url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html
229
reference_url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
230
reference_url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
reference_id
reference_type
scores
url http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
231
reference_url http://www.securityfocus.com/archive/1/533724/100/0/threaded
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533724/100/0/threaded
232
reference_url http://www.securityfocus.com/archive/1/533746
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533746
233
reference_url http://www.securityfocus.com/archive/1/533747
reference_id
reference_type
scores
url http://www.securityfocus.com/archive/1/533747
234
reference_url http://www.securityfocus.com/bid/70574
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/70574
235
reference_url http://www.securitytracker.com/id/1031029
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031029
236
reference_url http://www.securitytracker.com/id/1031039
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031039
237
reference_url http://www.securitytracker.com/id/1031085
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031085
238
reference_url http://www.securitytracker.com/id/1031086
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031086
239
reference_url http://www.securitytracker.com/id/1031087
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031087
240
reference_url http://www.securitytracker.com/id/1031088
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031088
241
reference_url http://www.securitytracker.com/id/1031089
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031089
242
reference_url http://www.securitytracker.com/id/1031090
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031090
243
reference_url http://www.securitytracker.com/id/1031091
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031091
244
reference_url http://www.securitytracker.com/id/1031092
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031092
245
reference_url http://www.securitytracker.com/id/1031093
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031093
246
reference_url http://www.securitytracker.com/id/1031094
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031094
247
reference_url http://www.securitytracker.com/id/1031095
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031095
248
reference_url http://www.securitytracker.com/id/1031096
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031096
249
reference_url http://www.securitytracker.com/id/1031105
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031105
250
reference_url http://www.securitytracker.com/id/1031106
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031106
251
reference_url http://www.securitytracker.com/id/1031107
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031107
252
reference_url http://www.securitytracker.com/id/1031120
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031120
253
reference_url http://www.securitytracker.com/id/1031123
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031123
254
reference_url http://www.securitytracker.com/id/1031124
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031124
255
reference_url http://www.securitytracker.com/id/1031130
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031130
256
reference_url http://www.securitytracker.com/id/1031131
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031131
257
reference_url http://www.securitytracker.com/id/1031132
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1031132
258
reference_url http://www.ubuntu.com/usn/USN-2486-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2486-1
259
reference_url http://www.ubuntu.com/usn/USN-2487-1
reference_id
reference_type
scores
url http://www.ubuntu.com/usn/USN-2487-1
260
reference_url http://www.us-cert.gov/ncas/alerts/TA14-290A
reference_id
reference_type
scores
url http://www.us-cert.gov/ncas/alerts/TA14-290A
261
reference_url http://www.vmware.com/security/advisories/VMSA-2015-0003.html
reference_id
reference_type
scores
url http://www.vmware.com/security/advisories/VMSA-2015-0003.html
262
reference_url http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
reference_id
reference_type
scores
url http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0
263
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1152789
reference_id 1152789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1152789
264
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765539
reference_id 765539
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765539
265
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765702
reference_id 765702
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=765702
266
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768164
reference_id 768164
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=768164
267
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769904
reference_id 769904
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=769904
268
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771359
reference_id 771359
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=771359
269
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.10:*:*:*:*:*:*:*
270
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.11:*:*:*:*:*:*:*
271
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.12:*:*:*:*:*:*:*
272
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.0.13:*:*:*:*:*:*:*
273
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.0:*:*:*:*:*:*:*
274
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.1:*:*:*:*:*:*:*
275
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.3:*:*:*:*:*:*:*
276
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.4:*:*:*:*:*:*:*
277
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.5:*:*:*:*:*:*:*
278
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.6:*:*:*:*:*:*:*
279
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.7:*:*:*:*:*:*:*
280
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.8:*:*:*:*:*:*:*
281
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.1.9:*:*:*:*:*:*:*
282
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.0:*:*:*:*:*:*:*
283
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.1:*:*:*:*:*:*:*
284
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.2:*:*:*:*:*:*:*
285
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.3:*:*:*:*:*:*:*
286
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.4:*:*:*:*:*:*:*
287
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.2.5:*:*:*:*:*:*:*
288
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.0:*:*:*:*:*:*:*
289
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.1:*:*:*:*:*:*:*
290
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.2:*:*:*:*:*:*:*
291
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.3:*:*:*:*:*:*:*
292
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:vios:2.2.3.4:*:*:*:*:*:*:*
293
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*
294
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:novell:suse_linux_enterprise_software_development_kit:12.0:*:*:*:*:*:*:*
295
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8:*:*:*:*:*:*:*
296
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8a:*:*:*:*:*:*:*
297
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8b:*:*:*:*:*:*:*
298
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8c:*:*:*:*:*:*:*
299
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8d:*:*:*:*:*:*:*
300
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8e:*:*:*:*:*:*:*
301
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8f:*:*:*:*:*:*:*
302
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8g:*:*:*:*:*:*:*
303
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8h:*:*:*:*:*:*:*
304
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8i:*:*:*:*:*:*:*
305
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8j:*:*:*:*:*:*:*
306
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8k:*:*:*:*:*:*:*
307
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8l:*:*:*:*:*:*:*
308
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:*:*:*:*:*:*:*
309
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8m:beta1:*:*:*:*:*:*
310
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8n:*:*:*:*:*:*:*
311
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8o:*:*:*:*:*:*:*
312
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8p:*:*:*:*:*:*:*
313
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8q:*:*:*:*:*:*:*
314
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8r:*:*:*:*:*:*:*
315
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8s:*:*:*:*:*:*:*
316
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8t:*:*:*:*:*:*:*
317
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8u:*:*:*:*:*:*:*
318
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8v:*:*:*:*:*:*:*
319
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8w:*:*:*:*:*:*:*
320
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8x:*:*:*:*:*:*:*
321
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8y:*:*:*:*:*:*:*
322
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8z:*:*:*:*:*:*:*
323
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8za:*:*:*:*:*:*:*
324
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:0.9.8zb:*:*:*:*:*:*:*
325
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:*:*:*:*:*:*:*
326
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0a:*:*:*:*:*:*:*
327
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0b:*:*:*:*:*:*:*
328
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta1:*:*:*:*:*:*
329
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta2:*:*:*:*:*:*
330
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta3:*:*:*:*:*:*
331
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta4:*:*:*:*:*:*
332
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0:beta5:*:*:*:*:*:*
333
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0c:*:*:*:*:*:*:*
334
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0d:*:*:*:*:*:*:*
335
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0e:*:*:*:*:*:*:*
336
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0f:*:*:*:*:*:*:*
337
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0g:*:*:*:*:*:*:*
338
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0h:*:*:*:*:*:*:*
339
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0i:*:*:*:*:*:*:*
340
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0j:*:*:*:*:*:*:*
341
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0k:*:*:*:*:*:*:*
342
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0l:*:*:*:*:*:*:*
343
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0m:*:*:*:*:*:*:*
344
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.0n:*:*:*:*:*:*:*
345
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:*:*:*:*:*:*:*
346
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1a:*:*:*:*:*:*:*
347
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1b:*:*:*:*:*:*:*
348
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta1:*:*:*:*:*:*
349
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta2:*:*:*:*:*:*
350
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1:beta3:*:*:*:*:*:*
351
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1c:*:*:*:*:*:*:*
352
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1d:*:*:*:*:*:*:*
353
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1e:*:*:*:*:*:*:*
354
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1f:*:*:*:*:*:*:*
355
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1g:*:*:*:*:*:*:*
356
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1h:*:*:*:*:*:*:*
357
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
reference_id cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:1.0.1i:*:*:*:*:*:*:*
358
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:11.2.0.4:*:*:*:*:*:*:*
359
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:database:12.1.0.2:*:*:*:*:*:*:*
360
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_id cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
361
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
362
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
363
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*
364
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*
365
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_id cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*
366
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:5.3:*:*:*:*:*:*:*
367
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*
368
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*
369
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*
370
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*
371
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1:*:*:*:*:*:*:*
372
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.1:*:*:*:*:*:*:*
373
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.2:*:*:*:*:*:*:*
374
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.3:*:*:*:*:*:*:*
375
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.1.4:*:*:*:*:*:*:*
376
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2:*:*:*:*:*:*:*
377
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.1:*:*:*:*:*:*:*
378
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:5.2.2:*:*:*:*:*:*:*
379
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:*:*:*:*:*:*:*
380
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.1:*:*:*:*:*:*:*
381
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.2:*:*:*:*:*:*:*
382
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.3:*:*:*:*:*:*:*
383
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.4:*:*:*:*:*:*:*
384
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.5:*:*:*:*:*:*:*
385
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0.6:*:*:*:*:*:*:*
386
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.0:beta:*:*:*:*:*:*
387
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1:*:*:*:*:*:*:*
388
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.1:*:*:*:*:*:*:*
389
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.2:*:*:*:*:*:*:*
390
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.3:*:*:*:*:*:*:*
391
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.4:*:*:*:*:*:*:*
392
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:netbsd:netbsd:6.1.5:*:*:*:*:*:*:*
393
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:10.0:*:*:*:*:*:*:*
394
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:*:*:*:*:*:*:*
395
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:12.0:*:*:*:*:*:*:*
396
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_desktop:9.0:*:*:*:*:*:*:*
397
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*
398
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:vmware:*:*
399
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:novell:suse_linux_enterprise_server:12.0:*:*:*:*:*:*:*
400
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*
401
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*
402
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
403
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
404
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
405
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:5.0:*:*:*:*:*:*:*
406
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*
407
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
408
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
409
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:5.0:*:*:*:*:*:*:*
410
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*
411
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server_supplementary:7.0:*:*:*:*:*:*:*
412
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
413
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
414
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*
415
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
reference_id cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:7.0:*:*:*:*:*:*:*
416
reference_url https://nvd.nist.gov/vuln/detail/CVE-2014-3566
reference_id CVE-2014-3566
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:P/I:N/A:N
1
value 3.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2014-3566
417
reference_url https://security.gentoo.org/glsa/201411-10
reference_id GLSA-201411-10
reference_type
scores
url https://security.gentoo.org/glsa/201411-10
418
reference_url https://security.gentoo.org/glsa/201507-14
reference_id GLSA-201507-14
reference_type
scores
url https://security.gentoo.org/glsa/201507-14
419
reference_url https://security.gentoo.org/glsa/201606-11
reference_id GLSA-201606-11
reference_type
scores
url https://security.gentoo.org/glsa/201606-11
420
reference_url https://access.redhat.com/errata/RHSA-2014:1876
reference_id RHSA-2014:1876
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1876
421
reference_url https://access.redhat.com/errata/RHSA-2014:1877
reference_id RHSA-2014:1877
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1877
422
reference_url https://access.redhat.com/errata/RHSA-2014:1880
reference_id RHSA-2014:1880
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1880
423
reference_url https://access.redhat.com/errata/RHSA-2014:1881
reference_id RHSA-2014:1881
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1881
424
reference_url https://access.redhat.com/errata/RHSA-2014:1882
reference_id RHSA-2014:1882
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1882
425
reference_url https://access.redhat.com/errata/RHSA-2014:1920
reference_id RHSA-2014:1920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:1920
426
reference_url https://access.redhat.com/errata/RHSA-2015:0010
reference_id RHSA-2015:0010
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0010
427
reference_url https://access.redhat.com/errata/RHSA-2015:0011
reference_id RHSA-2015:0011
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0011
428
reference_url https://access.redhat.com/errata/RHSA-2015:0012
reference_id RHSA-2015:0012
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0012
429
reference_url https://access.redhat.com/errata/RHSA-2015:0067
reference_id RHSA-2015:0067
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0067
430
reference_url https://access.redhat.com/errata/RHSA-2015:0068
reference_id RHSA-2015:0068
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0068
431
reference_url https://access.redhat.com/errata/RHSA-2015:0069
reference_id RHSA-2015:0069
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0069
432
reference_url https://access.redhat.com/errata/RHSA-2015:0079
reference_id RHSA-2015:0079
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0079
433
reference_url https://access.redhat.com/errata/RHSA-2015:0080
reference_id RHSA-2015:0080
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0080
434
reference_url https://access.redhat.com/errata/RHSA-2015:0085
reference_id RHSA-2015:0085
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0085
435
reference_url https://access.redhat.com/errata/RHSA-2015:0086
reference_id RHSA-2015:0086
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0086
436
reference_url https://access.redhat.com/errata/RHSA-2015:0264
reference_id RHSA-2015:0264
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:0264
437
reference_url https://access.redhat.com/errata/RHSA-2015:1545
reference_id RHSA-2015:1545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1545
438
reference_url https://access.redhat.com/errata/RHSA-2015:1546
reference_id RHSA-2015:1546
reference_type
scores
url https://access.redhat.com/errata/RHSA-2015:1546
439
reference_url https://usn.ubuntu.com/2486-1/
reference_id USN-2486-1
reference_type
scores
url https://usn.ubuntu.com/2486-1/
440
reference_url https://usn.ubuntu.com/2487-1/
reference_id USN-2487-1
reference_type
scores
url https://usn.ubuntu.com/2487-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.3.8-5?distro=trixie
purl pkg:deb/debian/gnutls28@3.3.8-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.3.8-5%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2014-3566
risk_score 7.8
exploitability 2.0
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xap5-djda-2uem
53
url VCID-y71t-sfb1-w3gw
vulnerability_id VCID-y71t-sfb1-w3gw
summary
Multiple vulnerabilities have been found in GnuTLS, the worst of
    which may allow execution of arbitrary code.
references
0
reference_url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
reference_id
reference_type
scores
url http://lists.opensuse.org/opensuse-security-announce/2017-02/msg00005.html
1
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5334.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-5334.json
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-5334
reference_id
reference_type
scores
0
value 0.05592
scoring_system epss
scoring_elements 0.90264
published_at 2026-04-01T12:55:00Z
1
value 0.05592
scoring_system epss
scoring_elements 0.90308
published_at 2026-04-13T12:55:00Z
2
value 0.05592
scoring_system epss
scoring_elements 0.90307
published_at 2026-04-09T12:55:00Z
3
value 0.05592
scoring_system epss
scoring_elements 0.90315
published_at 2026-04-11T12:55:00Z
4
value 0.05592
scoring_system epss
scoring_elements 0.90314
published_at 2026-04-12T12:55:00Z
5
value 0.05592
scoring_system epss
scoring_elements 0.90267
published_at 2026-04-02T12:55:00Z
6
value 0.05592
scoring_system epss
scoring_elements 0.9028
published_at 2026-04-04T12:55:00Z
7
value 0.05592
scoring_system epss
scoring_elements 0.90285
published_at 2026-04-07T12:55:00Z
8
value 0.05592
scoring_system epss
scoring_elements 0.903
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-5334
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv2
scoring_elements AV:N/AC:M/Au:N/C:N/I:N/A:P
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b
reference_id
reference_type
scores
url https://gitlab.com/gnutls/gnutls/commit/c5aaa488a3d6df712dc8dff23a049133cab5ec1b
6
reference_url https://gnutls.org/security.html#GNUTLS-SA-2017-1
reference_id
reference_type
scores
url https://gnutls.org/security.html#GNUTLS-SA-2017-1
7
reference_url http://www.openwall.com/lists/oss-security/2017/01/10/7
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/10/7
8
reference_url http://www.openwall.com/lists/oss-security/2017/01/11/4
reference_id
reference_type
scores
url http://www.openwall.com/lists/oss-security/2017/01/11/4
9
reference_url http://www.securityfocus.com/bid/95370
reference_id
reference_type
scores
url http://www.securityfocus.com/bid/95370
10
reference_url http://www.securitytracker.com/id/1037576
reference_id
reference_type
scores
url http://www.securitytracker.com/id/1037576
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1411835
reference_id 1411835
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1411835
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.0:*:*:*:*:*:*:*
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.1:*:*:*:*:*:*:*
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.2:*:*:*:*:*:*:*
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.3:*:*:*:*:*:*:*
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.4:*:*:*:*:*:*:*
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.5:*:*:*:*:*:*:*
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.6:*:*:*:*:*:*:*
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_id cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:gnutls:3.5.7:*:*:*:*:*:*:*
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
22
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_id cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*
23
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-5334
reference_id CVE-2017-5334
reference_type
scores
0
value 7.5
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:P/A:P
1
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://nvd.nist.gov/vuln/detail/CVE-2017-5334
24
reference_url https://security.gentoo.org/glsa/201702-04
reference_id GLSA-201702-04
reference_type
scores
url https://security.gentoo.org/glsa/201702-04
25
reference_url https://access.redhat.com/errata/RHSA-2017:2292
reference_id RHSA-2017:2292
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:2292
26
reference_url https://usn.ubuntu.com/3183-1/
reference_id USN-3183-1
reference_type
scores
url https://usn.ubuntu.com/3183-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.8-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.8-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.8-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2017-5334
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y71t-sfb1-w3gw
54
url VCID-zjx8-ydmt-juf3
vulnerability_id VCID-zjx8-ydmt-juf3
summary gnutls: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10844.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-10844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2018-10844
reference_id
reference_type
scores
0
value 0.00184
scoring_system epss
scoring_elements 0.40036
published_at 2026-04-01T12:55:00Z
1
value 0.00184
scoring_system epss
scoring_elements 0.40185
published_at 2026-04-02T12:55:00Z
2
value 0.00184
scoring_system epss
scoring_elements 0.4021
published_at 2026-04-11T12:55:00Z
3
value 0.00184
scoring_system epss
scoring_elements 0.40133
published_at 2026-04-07T12:55:00Z
4
value 0.00184
scoring_system epss
scoring_elements 0.40186
published_at 2026-04-08T12:55:00Z
5
value 0.00184
scoring_system epss
scoring_elements 0.40198
published_at 2026-04-09T12:55:00Z
6
value 0.00184
scoring_system epss
scoring_elements 0.40172
published_at 2026-04-12T12:55:00Z
7
value 0.00184
scoring_system epss
scoring_elements 0.40154
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2018-10844
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1582571
reference_id 1582571
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1582571
5
reference_url https://access.redhat.com/errata/RHSA-2018:3050
reference_id RHSA-2018:3050
reference_type
scores
url https://access.redhat.com/errata/RHSA-2018:3050
6
reference_url https://usn.ubuntu.com/3999-1/
reference_id USN-3999-1
reference_type
scores
url https://usn.ubuntu.com/3999-1/
fixed_packages
0
url pkg:deb/debian/gnutls28@3.5.19-1?distro=trixie
purl pkg:deb/debian/gnutls28@3.5.19-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.5.19-1%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2018-10844
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjx8-ydmt-juf3
55
url VCID-zynz-y95c-s3fs
vulnerability_id VCID-zynz-y95c-s3fs
summary gnutls: dane_query_tlsa() CVE-2013-4466 fix off-by-one
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4487.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4487.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2013-4487
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56452
published_at 2026-04-01T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.56549
published_at 2026-04-02T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.56571
published_at 2026-04-04T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.5655
published_at 2026-04-07T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56601
published_at 2026-04-08T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56605
published_at 2026-04-09T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56615
published_at 2026-04-11T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56591
published_at 2026-04-12T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2013-4487
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1025637
reference_id 1025637
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1025637
fixed_packages
0
url pkg:deb/debian/gnutls28@0?distro=trixie
purl pkg:deb/debian/gnutls28@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@0%3Fdistro=trixie
1
url pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.1-5%2Bdeb11u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.1-5%252Bdeb11u5%3Fdistro=trixie
2
url pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
purl pkg:deb/debian/gnutls28@3.7.9-2%2Bdeb12u5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie
3
url pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.9-3%2Bdeb13u2?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.9-3%252Bdeb13u2%3Fdistro=trixie
4
url pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
purl pkg:deb/debian/gnutls28@3.8.12-3?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.8.12-3%3Fdistro=trixie
aliases CVE-2013-4487
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zynz-y95c-s3fs
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/gnutls28@3.7.9-2%252Bdeb12u5%3Fdistro=trixie