Lookup for vulnerable packages by Package URL.

GET /api/packages/1038149?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/1038149?format=api",
    "purl": "pkg:deb/debian/nettle@1.14.1-1",
    "type": "deb",
    "namespace": "debian",
    "name": "nettle",
    "version": "1.14.1-1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "3.7.3-1",
    "latest_non_vulnerable_version": "3.7.3-1",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85345?format=api",
            "vulnerability_id": "VCID-4faz-8fkq-1yey",
            "summary": "nettle: secp256 calculation bug",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176807.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176807.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177229.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177229.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177473.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177473.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2582.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2582.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93904",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93897",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93903",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93838",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93847",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93856",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93859",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93867",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93871",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93876",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.12343",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93877",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8803"
                },
                {
                    "reference_url": "https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html"
                },
                {
                    "reference_url": "https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003028.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/02/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/02/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/03/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/03/1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2897-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2897-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304303",
                    "reference_id": "1304303",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304303"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813679",
                    "reference_id": "813679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813679"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8803",
                    "reference_id": "CVE-2015-8803",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8803"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2582",
                    "reference_id": "RHSA-2016:2582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2582"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2897-1/",
                    "reference_id": "USN-2897-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2897-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038156?format=api",
                    "purl": "pkg:deb/debian/nettle@3.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5q33-ye8y-ruee"
                        },
                        {
                            "vulnerability": "VCID-9a4v-x2jy-27br"
                        },
                        {
                            "vulnerability": "VCID-bzux-re4q-s7hu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.3-1"
                }
            ],
            "aliases": [
                "CVE-2015-8803"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4faz-8fkq-1yey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/33591?format=api",
            "vulnerability_id": "VCID-5q33-ye8y-ruee",
            "summary": "A vulnerability in Nettle could lead to a Denial of Service\n    condition.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20305.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20305.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.38964",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39054",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39172",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39142",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3915",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39171",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39091",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39145",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39162",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39174",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39137",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00176",
                            "scoring_system": "epss",
                            "scoring_elements": "0.39119",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20305"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "8.1",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942533",
                    "reference_id": "1942533",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1942533"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985652",
                    "reference_id": "985652",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=985652"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-1763",
                    "reference_id": "AVG-1763",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-1763"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20305",
                    "reference_id": "CVE-2021-20305",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20305"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202105-31",
                    "reference_id": "GLSA-202105-31",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/202105-31"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1145",
                    "reference_id": "RHSA-2021:1145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1145"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1206",
                    "reference_id": "RHSA-2021:1206",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1206"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1245",
                    "reference_id": "RHSA-2021:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:1246",
                    "reference_id": "RHSA-2021:1246",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:1246"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2280",
                    "reference_id": "RHSA-2021:2280",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2280"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2356",
                    "reference_id": "RHSA-2021:2356",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2356"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2758",
                    "reference_id": "RHSA-2021:2758",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2758"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:2760",
                    "reference_id": "RHSA-2021:2760",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:2760"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4906-1/",
                    "reference_id": "USN-4906-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4906-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038157?format=api",
                    "purl": "pkg:deb/debian/nettle@3.4.1-1%2Bdeb10u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5q33-ye8y-ruee"
                        },
                        {
                            "vulnerability": "VCID-bzux-re4q-s7hu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.4.1-1%252Bdeb10u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050441?format=api",
                    "purl": "pkg:deb/debian/nettle@3.7.3-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.7.3-1"
                }
            ],
            "aliases": [
                "CVE-2021-20305"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5q33-ye8y-ruee"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82972?format=api",
            "vulnerability_id": "VCID-9a4v-x2jy-27br",
            "summary": "nettle: Leaky data conversion exposing a manager oracle",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16869.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-16869.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2866",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28744",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28792",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28599",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28665",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28705",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28707",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28662",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28615",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28634",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2861",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00106",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2856",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-16869"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16869"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654930",
                    "reference_id": "1654930",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1654930"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4990-1/",
                    "reference_id": "USN-4990-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4990-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038157?format=api",
                    "purl": "pkg:deb/debian/nettle@3.4.1-1%2Bdeb10u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5q33-ye8y-ruee"
                        },
                        {
                            "vulnerability": "VCID-bzux-re4q-s7hu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.4.1-1%252Bdeb10u1"
                }
            ],
            "aliases": [
                "CVE-2018-16869"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9a4v-x2jy-27br"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/11004?format=api",
            "vulnerability_id": "VCID-bzux-re4q-s7hu",
            "summary": "Improper Input Validation\nA flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3580.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-3580.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3580",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28366",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28233",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28385",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28389",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28346",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28288",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.283",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.2828",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28441",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28483",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28275",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00104",
                            "scoring_system": "epss",
                            "scoring_elements": "0.28342",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-3580"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:22:19Z/"
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1967983"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3580"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989631",
                    "reference_id": "989631",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989631"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-202106-28",
                    "reference_id": "ASA-202106-28",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-202106-28"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-2052",
                    "reference_id": "AVG-2052",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Medium",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-2052"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3580",
                    "reference_id": "CVE-2021-3580",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3580"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/202401-24",
                    "reference_id": "GLSA-202401-24",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:22:19Z/"
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/202401-24"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html",
                    "reference_id": "msg00008.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:22:19Z/"
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2021/09/msg00008.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20211104-0006/",
                    "reference_id": "ntap-20211104-0006",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-19T14:22:19Z/"
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20211104-0006/"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2021:4451",
                    "reference_id": "RHSA-2021:4451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2021:4451"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4990-1/",
                    "reference_id": "USN-4990-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4990-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038157?format=api",
                    "purl": "pkg:deb/debian/nettle@3.4.1-1%2Bdeb10u1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5q33-ye8y-ruee"
                        },
                        {
                            "vulnerability": "VCID-bzux-re4q-s7hu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.4.1-1%252Bdeb10u1"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1050441?format=api",
                    "purl": "pkg:deb/debian/nettle@3.7.3-1",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.7.3-1"
                }
            ],
            "aliases": [
                "CVE-2021-3580"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bzux-re4q-s7hu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/60210?format=api",
            "vulnerability_id": "VCID-g7x1-qtff-8qb6",
            "summary": "A cache-related side channel vulnerability was found in nettle\n    which might allow an attacker to obtain sensitive information.",
            "references": [
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2582.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2582.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6489.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6489.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82134",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82121",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01684",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82156",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86602",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86605",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8661",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86557",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86576",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86586",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86601",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86598",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6489"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489"
                },
                {
                    "reference_url": "https://eprint.iacr.org/2016/596.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://eprint.iacr.org/2016/596.pdf"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:A/AC:M/Au:N/C:P/I:P/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.lysator.liu.se/nettle/nettle/commit/3fe1d6549765ecfb24f0b80b2ed086fdc818bff3"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2020.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/07/29/7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/07/29/7"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-3193-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-3193-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362016",
                    "reference_id": "1362016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362016"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832983",
                    "reference_id": "832983",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=832983"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6489",
                    "reference_id": "CVE-2016-6489",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6489"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-21",
                    "reference_id": "GLSA-201706-21",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-21"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2582",
                    "reference_id": "RHSA-2016:2582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2582"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3193-1/",
                    "reference_id": "USN-3193-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3193-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038156?format=api",
                    "purl": "pkg:deb/debian/nettle@3.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5q33-ye8y-ruee"
                        },
                        {
                            "vulnerability": "VCID-9a4v-x2jy-27br"
                        },
                        {
                            "vulnerability": "VCID-bzux-re4q-s7hu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.3-1"
                }
            ],
            "aliases": [
                "CVE-2016-6489"
            ],
            "risk_score": 3.4,
            "exploitability": "0.5",
            "weighted_severity": "6.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-g7x1-qtff-8qb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85347?format=api",
            "vulnerability_id": "VCID-ka7g-uw8s-7fdv",
            "summary": "nettle: secp256 calculation bug",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2582.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2582.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8805.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8805.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78906",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78911",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78835",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78842",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7887",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78853",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78878",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78884",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78908",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78892",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01196",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78882",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8805"
                },
                {
                    "reference_url": "https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805"
                },
                {
                    "reference_url": "https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.lysator.liu.se/nettle/nettle/commit/c71d2c9d20eeebb985e3872e4550137209e3ce4d"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/02/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/02/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/03/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/03/1"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/84272",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/84272"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2897-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2897-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304382",
                    "reference_id": "1304382",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304382"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813679",
                    "reference_id": "813679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813679"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8805",
                    "reference_id": "CVE-2015-8805",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8805"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2582",
                    "reference_id": "RHSA-2016:2582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2582"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2897-1/",
                    "reference_id": "USN-2897-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2897-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038156?format=api",
                    "purl": "pkg:deb/debian/nettle@3.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5q33-ye8y-ruee"
                        },
                        {
                            "vulnerability": "VCID-9a4v-x2jy-27br"
                        },
                        {
                            "vulnerability": "VCID-bzux-re4q-s7hu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.3-1"
                }
            ],
            "aliases": [
                "CVE-2015-8805"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ka7g-uw8s-7fdv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85346?format=api",
            "vulnerability_id": "VCID-py38-zkxu-u3ey",
            "summary": "nettle: miscalculations on secp384 curve",
            "references": [
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00091.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00093.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-02/msg00100.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2016-2582.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://rhn.redhat.com/errata/RHSA-2016-2582.html"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-8804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93761",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93758",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93696",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93705",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93716",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93719",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93727",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93729",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93734",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93733",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.11875",
                            "scoring_system": "epss",
                            "scoring_elements": "0.93751",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8804"
                },
                {
                    "reference_url": "https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://blog.fuzzing-project.org/38-Miscomputations-of-elliptic-curve-scalar-multiplications-in-Nettle.html"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804"
                },
                {
                    "reference_url": "https://git.lysator.liu.se/nettle/nettle/commit/fa269b6ad06dd13c901dbd84a12e52b918a09cd7",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://git.lysator.liu.se/nettle/nettle/commit/fa269b6ad06dd13c901dbd84a12e52b918a09cd7"
                },
                {
                    "reference_url": "https://lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.gnu.org/archive/html/info-gnu/2016-01/msg00006.html"
                },
                {
                    "reference_url": "https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003024.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.lysator.liu.se/pipermail/nettle-bugs/2015/003024.html"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/02/2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/02/2"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2016/02/03/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2016/02/03/1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2897-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.ubuntu.com/usn/USN-2897-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304379",
                    "reference_id": "1304379",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1304379"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813679",
                    "reference_id": "813679",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=813679"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:nettle_project:nettle:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8804",
                    "reference_id": "CVE-2015-8804",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
                        },
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8804"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2016:2582",
                    "reference_id": "RHSA-2016:2582",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2016:2582"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2897-1/",
                    "reference_id": "USN-2897-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2897-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1038156?format=api",
                    "purl": "pkg:deb/debian/nettle@3.3-1",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-5q33-ye8y-ruee"
                        },
                        {
                            "vulnerability": "VCID-9a4v-x2jy-27br"
                        },
                        {
                            "vulnerability": "VCID-bzux-re4q-s7hu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@3.3-1"
                }
            ],
            "aliases": [
                "CVE-2015-8804"
            ],
            "risk_score": 4.4,
            "exploitability": "0.5",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-py38-zkxu-u3ey"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.4",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/nettle@1.14.1-1"
}