Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
Typedeb
Namespacedebian
Namelibtasn1-3
Version2.13-2+deb7u2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-f69k-zy45-uued
vulnerability_id VCID-f69k-zy45-uued
summary
Multiple vulnerabilities have been discovered in GNU Libtasn1, the
    worse of which can allow a context-dependent attacker to cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3469.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3469.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3469
reference_id
reference_type
scores
0
value 0.08667
scoring_system epss
scoring_elements 0.92418
published_at 2026-04-01T12:55:00Z
1
value 0.08667
scoring_system epss
scoring_elements 0.92425
published_at 2026-04-02T12:55:00Z
2
value 0.08667
scoring_system epss
scoring_elements 0.92433
published_at 2026-04-04T12:55:00Z
3
value 0.08667
scoring_system epss
scoring_elements 0.92436
published_at 2026-04-07T12:55:00Z
4
value 0.08667
scoring_system epss
scoring_elements 0.92447
published_at 2026-04-08T12:55:00Z
5
value 0.08667
scoring_system epss
scoring_elements 0.92452
published_at 2026-04-09T12:55:00Z
6
value 0.08667
scoring_system epss
scoring_elements 0.92458
published_at 2026-04-11T12:55:00Z
7
value 0.08667
scoring_system epss
scoring_elements 0.9246
published_at 2026-04-12T12:55:00Z
8
value 0.08667
scoring_system epss
scoring_elements 0.92459
published_at 2026-04-13T12:55:00Z
9
value 0.08667
scoring_system epss
scoring_elements 0.92469
published_at 2026-04-18T12:55:00Z
10
value 0.08667
scoring_system epss
scoring_elements 0.92472
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3469
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1102329
reference_id 1102329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1102329
6
reference_url https://security.gentoo.org/glsa/201408-09
reference_id GLSA-201408-09
reference_type
scores
url https://security.gentoo.org/glsa/201408-09
7
reference_url https://access.redhat.com/errata/RHSA-2014:0594
reference_id RHSA-2014:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0594
8
reference_url https://access.redhat.com/errata/RHSA-2014:0596
reference_id RHSA-2014:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0596
9
reference_url https://access.redhat.com/errata/RHSA-2014:0687
reference_id RHSA-2014:0687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0687
10
reference_url https://access.redhat.com/errata/RHSA-2014:0815
reference_id RHSA-2014:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0815
11
reference_url https://usn.ubuntu.com/2294-1/
reference_id USN-2294-1
reference_type
scores
url https://usn.ubuntu.com/2294-1/
fixed_packages
0
url pkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
purl pkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-3@2.13-2%252Bdeb7u2
aliases CVE-2014-3469
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f69k-zy45-uued
1
url VCID-k6ay-ezmy-gkgj
vulnerability_id VCID-k6ay-ezmy-gkgj
summary
Multiple vulnerabilities have been discovered in GNU Libtasn1, the
    worse of which can allow a context-dependent attacker to cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3467.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3467
reference_id
reference_type
scores
0
value 0.06825
scoring_system epss
scoring_elements 0.91289
published_at 2026-04-01T12:55:00Z
1
value 0.06825
scoring_system epss
scoring_elements 0.91294
published_at 2026-04-02T12:55:00Z
2
value 0.06825
scoring_system epss
scoring_elements 0.91305
published_at 2026-04-04T12:55:00Z
3
value 0.06825
scoring_system epss
scoring_elements 0.91312
published_at 2026-04-07T12:55:00Z
4
value 0.06825
scoring_system epss
scoring_elements 0.91324
published_at 2026-04-08T12:55:00Z
5
value 0.06825
scoring_system epss
scoring_elements 0.9133
published_at 2026-04-09T12:55:00Z
6
value 0.06825
scoring_system epss
scoring_elements 0.91337
published_at 2026-04-11T12:55:00Z
7
value 0.06825
scoring_system epss
scoring_elements 0.91339
published_at 2026-04-12T12:55:00Z
8
value 0.06825
scoring_system epss
scoring_elements 0.91338
published_at 2026-04-13T12:55:00Z
9
value 0.06825
scoring_system epss
scoring_elements 0.91363
published_at 2026-04-16T12:55:00Z
10
value 0.06825
scoring_system epss
scoring_elements 0.91362
published_at 2026-04-18T12:55:00Z
11
value 0.06825
scoring_system epss
scoring_elements 0.91364
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1102022
reference_id 1102022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1102022
6
reference_url https://security.gentoo.org/glsa/201408-09
reference_id GLSA-201408-09
reference_type
scores
url https://security.gentoo.org/glsa/201408-09
7
reference_url https://access.redhat.com/errata/RHSA-2014:0594
reference_id RHSA-2014:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0594
8
reference_url https://access.redhat.com/errata/RHSA-2014:0596
reference_id RHSA-2014:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0596
9
reference_url https://access.redhat.com/errata/RHSA-2014:0687
reference_id RHSA-2014:0687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0687
10
reference_url https://access.redhat.com/errata/RHSA-2014:0815
reference_id RHSA-2014:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0815
11
reference_url https://usn.ubuntu.com/2294-1/
reference_id USN-2294-1
reference_type
scores
url https://usn.ubuntu.com/2294-1/
fixed_packages
0
url pkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
purl pkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-3@2.13-2%252Bdeb7u2
aliases CVE-2014-3467
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k6ay-ezmy-gkgj
2
url VCID-qawp-nzw5-8ud5
vulnerability_id VCID-qawp-nzw5-8ud5
summary
Multiple vulnerabilities have been discovered in GNU Libtasn1, the
    worse of which can allow a context-dependent attacker to cause a Denial of
    Service condition.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3468.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3468.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-3468
reference_id
reference_type
scores
0
value 0.10744
scoring_system epss
scoring_elements 0.93303
published_at 2026-04-01T12:55:00Z
1
value 0.10744
scoring_system epss
scoring_elements 0.93311
published_at 2026-04-02T12:55:00Z
2
value 0.10744
scoring_system epss
scoring_elements 0.93317
published_at 2026-04-04T12:55:00Z
3
value 0.10744
scoring_system epss
scoring_elements 0.93315
published_at 2026-04-07T12:55:00Z
4
value 0.10744
scoring_system epss
scoring_elements 0.93324
published_at 2026-04-08T12:55:00Z
5
value 0.10744
scoring_system epss
scoring_elements 0.93328
published_at 2026-04-09T12:55:00Z
6
value 0.10744
scoring_system epss
scoring_elements 0.93333
published_at 2026-04-11T12:55:00Z
7
value 0.10744
scoring_system epss
scoring_elements 0.93331
published_at 2026-04-12T12:55:00Z
8
value 0.10744
scoring_system epss
scoring_elements 0.93332
published_at 2026-04-13T12:55:00Z
9
value 0.10744
scoring_system epss
scoring_elements 0.9335
published_at 2026-04-16T12:55:00Z
10
value 0.10744
scoring_system epss
scoring_elements 0.93355
published_at 2026-04-18T12:55:00Z
11
value 0.10744
scoring_system epss
scoring_elements 0.93362
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-3468
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1102323
reference_id 1102323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1102323
6
reference_url https://security.gentoo.org/glsa/201408-09
reference_id GLSA-201408-09
reference_type
scores
url https://security.gentoo.org/glsa/201408-09
7
reference_url https://access.redhat.com/errata/RHSA-2014:0594
reference_id RHSA-2014:0594
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0594
8
reference_url https://access.redhat.com/errata/RHSA-2014:0596
reference_id RHSA-2014:0596
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0596
9
reference_url https://access.redhat.com/errata/RHSA-2014:0687
reference_id RHSA-2014:0687
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0687
10
reference_url https://access.redhat.com/errata/RHSA-2014:0815
reference_id RHSA-2014:0815
reference_type
scores
url https://access.redhat.com/errata/RHSA-2014:0815
11
reference_url https://usn.ubuntu.com/2294-1/
reference_id USN-2294-1
reference_type
scores
url https://usn.ubuntu.com/2294-1/
fixed_packages
0
url pkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
purl pkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-3@2.13-2%252Bdeb7u2
aliases CVE-2014-3468
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qawp-nzw5-8ud5
3
url VCID-vra9-zq52-ryap
vulnerability_id VCID-vra9-zq52-ryap
summary
Multiple vulnerabilities have been found in libtasn1, the worst of
    which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2806.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2015-2806
reference_id
reference_type
scores
0
value 0.09345
scoring_system epss
scoring_elements 0.92738
published_at 2026-04-01T12:55:00Z
1
value 0.09345
scoring_system epss
scoring_elements 0.92744
published_at 2026-04-02T12:55:00Z
2
value 0.09345
scoring_system epss
scoring_elements 0.9275
published_at 2026-04-04T12:55:00Z
3
value 0.09345
scoring_system epss
scoring_elements 0.92748
published_at 2026-04-07T12:55:00Z
4
value 0.09345
scoring_system epss
scoring_elements 0.92757
published_at 2026-04-08T12:55:00Z
5
value 0.09345
scoring_system epss
scoring_elements 0.92762
published_at 2026-04-09T12:55:00Z
6
value 0.09345
scoring_system epss
scoring_elements 0.92767
published_at 2026-04-11T12:55:00Z
7
value 0.09345
scoring_system epss
scoring_elements 0.92766
published_at 2026-04-13T12:55:00Z
8
value 0.09345
scoring_system epss
scoring_elements 0.92778
published_at 2026-04-18T12:55:00Z
9
value 0.09345
scoring_system epss
scoring_elements 0.92782
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2015-2806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1207192
reference_id 1207192
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1207192
4
reference_url https://security.gentoo.org/glsa/201509-04
reference_id GLSA-201509-04
reference_type
scores
url https://security.gentoo.org/glsa/201509-04
5
reference_url https://access.redhat.com/errata/RHSA-2017:1860
reference_id RHSA-2017:1860
reference_type
scores
url https://access.redhat.com/errata/RHSA-2017:1860
6
reference_url https://usn.ubuntu.com/2559-1/
reference_id USN-2559-1
reference_type
scores
url https://usn.ubuntu.com/2559-1/
fixed_packages
0
url pkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
purl pkg:deb/debian/libtasn1-3@2.13-2%2Bdeb7u2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-3@2.13-2%252Bdeb7u2
aliases CVE-2015-2806
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vra9-zq52-ryap
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-3@2.13-2%252Bdeb7u2