[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"vulnerability-12593":17,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":46},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},{"id":18,"detectable_with":19,"vuln_details":26,"vuln_id":43,"name":44,"published":45,"updated":27},12593,{"tool":20,"engine":23},{"id":21,"name":22},1,"Network Scanner",{"id":24,"name":25},3,"OpenVAS",{"id":18,"codename":27,"description":27,"severity":28,"risk_description":29,"public_description":30,"public_recommendation":31,"recommendation":27,"references":32,"cvssv3":35,"epss_score":36,"epss_percentile":37,"cve":38,"in_cisa_catalog":41,"date":42,"software_type":27,"vendor":27,"product":27,"ptt_exploit_capabilities":27},null,"high","The following vulnerabilities exist: - CVE-2022-3602: X.509 Email Address 4-byte Buffer Overflow - CVE-2022-3786: X.509 Email Address Variable Length Buffer Overflow","OpenSSL is prone to multiple vulnerabilities.","Update to version 3.0.7 or later.",[33,34],"https://www.openssl.org/news/secadv/20221101.txt","https://www.openssl.org/blog/blog/2022/11/01/email-address-overflows/",7.5,0.83219,0.9926,[39,40],"CVE-2022-3602","CVE-2022-3786",false,"2022-11-01T00:00:00Z","NETSCAN-OPENVAS-1.3.6.1.4.1.25623.1.0.104417","OpenSSL: Multiple Vulnerabilities (Nov 2022) - Windows","2022-10-28T00:00:00Z",["Island",47],{"key":48,"params":49,"result":51},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":50},"{\"text-color\":\"gray\"}",{"head":52},{}]