Lookup for vulnerable packages by Package URL.

GET /api/packages/57264?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/57264?format=api",
    "purl": "pkg:conan/openssl@3.1.1",
    "type": "conan",
    "namespace": "",
    "name": "openssl",
    "version": "3.1.1",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "3.2.6",
    "latest_non_vulnerable_version": "3.2.6",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/18400?format=api",
            "vulnerability_id": "VCID-b3u8-1a2y-judf",
            "summary": "Improper Authentication\nIssue summary: The AES-SIV cipher implementation contains a bug that causes\nit to ignore empty associated data entries which are unauthenticated as\na consequence.\n\nImpact summary: Applications that use the AES-SIV algorithm and want to\nauthenticate empty data entries as associated data can be mislead by removing\nadding or reordering such empty entries as these are ignored by the OpenSSL\nimplementation. We are currently unaware of any such applications.\n\nThe AES-SIV algorithm allows for authentication of multiple associated\ndata entries along with the encryption. To authenticate empty data the\napplication has to call EVP_EncryptUpdate() (or EVP_CipherUpdate()) with\nNULL pointer as the output buffer and 0 as the input buffer length.\nThe AES-SIV implementation in OpenSSL just returns success for such a call\ninstead of performing the associated data authentication operation.\nThe empty data thus will not be authenticated.\n\nAs this issue does not affect non-empty associated data authentication and\nwe expect it to be rare for an application to use empty associated data\nentries this is qualified as Low severity issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2975.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-2975.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2975",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40342",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40356",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40367",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40292",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40343",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40354",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40366",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40328",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00185",
                            "scoring_system": "epss",
                            "scoring_elements": "0.40309",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-2975"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/"
                        }
                    ],
                    "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=00e2f5eea29994d19293ec4e8c8775ba73678598"
                },
                {
                    "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/"
                        }
                    ],
                    "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=6a83f0c958811f07e0d11dfc6b5a6a98edfd5bdc"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20230725-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20230725-0004/"
                },
                {
                    "reference_url": "https://www.openssl.org/news/secadv/20230714.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/"
                        }
                    ],
                    "url": "https://www.openssl.org/news/secadv/20230714.txt"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/15/1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2023/07/15/1"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/19/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041818",
                    "reference_id": "1041818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041818"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223016",
                    "reference_id": "2223016",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223016"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2975",
                    "reference_id": "CVE-2023-2975",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2975"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2447",
                    "reference_id": "RHSA-2024:2447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2447"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6450-1/",
                    "reference_id": "USN-6450-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6450-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/56494?format=api",
                    "purl": "pkg:conan/openssl@3.1.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.3"
                }
            ],
            "aliases": [
                "CVE-2023-2975"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3u8-1a2y-judf"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/18438?format=api",
            "vulnerability_id": "VCID-vhkt-tbz6-wuf7",
            "summary": "Inefficient Regular Expression Complexity\nIssue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. One of those\nchecks confirms that the modulus ('p' parameter) is not too large. Trying to use\na very large modulus is slow and OpenSSL will not normally use a modulus which\nis over 10,000 bits in length.\n\nHowever the DH_check() function checks numerous aspects of the key or parameters\nthat have been supplied. Some of those checks use the supplied modulus value\neven if it has already been found to be too large.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulernable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the '-check' option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3446.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-3446.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76138",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76237",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76171",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76151",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76184",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76197",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76222",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76198",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00937",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76196",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2023-3446"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3446"
                },
                {
                    "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        }
                    ],
                    "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"
                },
                {
                    "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/"
                        }
                    ],
                    "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1fa20cf2f506113c761777127a38bce5068740eb"
                },
                {
                    "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/"
                        }
                    ],
                    "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=8780a896543a654e757db1b9396383f9d8095528"
                },
                {
                    "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/"
                        }
                    ],
                    "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a0a4d3c1e7138915563c0df4fe6a3f9377b839c"
                },
                {
                    "reference_url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/"
                        }
                    ],
                    "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc9867c1e03c22ebf56943be205202e576aabf23"
                },
                {
                    "reference_url": "https://www.openssl.org/news/secadv/20230719.txt",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"
                        },
                        {
                            "value": "Track",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/"
                        }
                    ],
                    "url": "https://www.openssl.org/news/secadv/20230719.txt"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/19/4",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2023/07/19/4"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/19/5",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2023/07/19/5"
                },
                {
                    "reference_url": "http://www.openwall.com/lists/oss-security/2023/07/19/6",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.openwall.com/lists/oss-security/2023/07/19/6"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041817",
                    "reference_id": "1041817",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1041817"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224962",
                    "reference_id": "2224962",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224962"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3446",
                    "reference_id": "CVE-2023-3446",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3446"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7622",
                    "reference_id": "RHSA-2023:7622",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7622"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7623",
                    "reference_id": "RHSA-2023:7623",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7623"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7625",
                    "reference_id": "RHSA-2023:7625",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7625"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7626",
                    "reference_id": "RHSA-2023:7626",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7626"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2023:7877",
                    "reference_id": "RHSA-2023:7877",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2023:7877"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0154",
                    "reference_id": "RHSA-2024:0154",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0154"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0208",
                    "reference_id": "RHSA-2024:0208",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0208"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0408",
                    "reference_id": "RHSA-2024:0408",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0408"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:0888",
                    "reference_id": "RHSA-2024:0888",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:0888"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:1415",
                    "reference_id": "RHSA-2024:1415",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:1415"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2264",
                    "reference_id": "RHSA-2024:2264",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2264"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2024:2447",
                    "reference_id": "RHSA-2024:2447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2024:2447"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6435-1/",
                    "reference_id": "USN-6435-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6435-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6435-2/",
                    "reference_id": "USN-6435-2",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6435-2/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6450-1/",
                    "reference_id": "USN-6450-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6450-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/6709-1/",
                    "reference_id": "USN-6709-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/6709-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7018-1/",
                    "reference_id": "USN-7018-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7018-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/7894-1/",
                    "reference_id": "USN-7894-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/7894-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/609074?format=api",
                    "purl": "pkg:conan/openssl@3.1.2",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2by2-tzdd-kkc7"
                        },
                        {
                            "vulnerability": "VCID-h6n1-tsqt-17bw"
                        },
                        {
                            "vulnerability": "VCID-sn5k-3e59-7ba8"
                        },
                        {
                            "vulnerability": "VCID-t4t8-753w-zqc5"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.2"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/56494?format=api",
                    "purl": "pkg:conan/openssl@3.1.3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.3"
                }
            ],
            "aliases": [
                "CVE-2023-3446"
            ],
            "risk_score": 2.4,
            "exploitability": "0.5",
            "weighted_severity": "4.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vhkt-tbz6-wuf7"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "2.4",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:conan/openssl@3.1.1"
}