Lookup for vulnerable packages by Package URL.

GET /api/packages/583390?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
    "type": "deb",
    "namespace": "debian",
    "name": "bouncycastle",
    "version": "1.56-1",
    "qualifiers": {
        "distro": "trixie"
    },
    "subpath": "",
    "is_vulnerable": false,
    "next_non_vulnerable_version": "1.58-1",
    "latest_non_vulnerable_version": "1.80-1",
    "affected_by_vulnerabilities": [],
    "fixing_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4692?format=api",
            "vulnerability_id": "VCID-31h9-7jrr-9kdt",
            "summary": "In the Bouncy Castle JCE Provider versions 1.51 to 1.55, a carry propagation bug was introduced in the implementation of squaring for several raw math classes have been fixed (org.bouncycastle.math.raw.Nat???). These classes are used by our custom elliptic curve implementations (org.bouncycastle.math.ec.custom.**), so there was the possibility of rare (in general usage) spurious calculations for elliptic curve scalar multiplications. Such errors would have been detected with high probability by the output validation for our scalar multipliers.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000340.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000340.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000340",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60578",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60436",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60512",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60538",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60508",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60557",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60573",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60594",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60579",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60558",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60599",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60605",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00397",
                            "scoring_system": "epss",
                            "scoring_elements": "0.60593",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000340"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000340",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000340"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/790642084c4e0cadd47352054f868cc8397e2c00#diff-e5934feac8203ca0104ab291a3560a31"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588688",
                    "reference_id": "1588688",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588688"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000340",
                    "reference_id": "CVE-2016-1000340",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000340"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r97x-3g8f-gx3m",
                    "reference_id": "GHSA-r97x-3g8f-gx3m",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r97x-3g8f-gx3m"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000340",
                "GHSA-r97x-3g8f-gx3m"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-31h9-7jrr-9kdt"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4694?format=api",
            "vulnerability_id": "VCID-ddqw-aj7g-s7c2",
            "summary": "In the Bouncy Castle JCE Provider version 1.55 and earlier DSA signature generation is vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55, or earlier, may allow an attacker to gain information about the signature's k value and ultimately the private value as well.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000341.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000341.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7409",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74114",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74093",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74078",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74045",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74074",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74048",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74096",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74164",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74128",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74137",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74129",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74042",
                            "published_at": "2026-04-01T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000341"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000341",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000341"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/acaac81f96fec91ab45bd0412beaf9c3acd8defa#diff-e75226a9ca49217a7276b29242ec59ce"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3727-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588708",
                    "reference_id": "1588708",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588708"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000341",
                    "reference_id": "CVE-2016-1000341",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000341"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-r9ch-m4fh-fc7q",
                    "reference_id": "GHSA-r9ch-m4fh-fc7q",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-r9ch-m4fh-fc7q"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1/",
                    "reference_id": "USN-3727-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3727-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000341",
                "GHSA-r9ch-m4fh-fc7q"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ddqw-aj7g-s7c2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5112?format=api",
            "vulnerability_id": "VCID-f4qa-9fn6-97az",
            "summary": "In the Bouncy Castle JCE Provider version 1.55 and earlier ECDSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000342.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000342.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64628",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64645",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64625",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64639",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64511",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64565",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64593",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64551",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.646",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64616",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00471",
                            "scoring_system": "epss",
                            "scoring_elements": "0.64621",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000342"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000342",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000342"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647#diff-25c3c78db788365f36839b3f2d3016b9"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3727-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588715",
                    "reference_id": "1588715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588715"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000342",
                    "reference_id": "CVE-2016-1000342",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000342"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-qcj7-g2j5-g7r3",
                    "reference_id": "GHSA-qcj7-g2j5-g7r3",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-qcj7-g2j5-g7r3"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1/",
                    "reference_id": "USN-3727-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3727-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000342",
                "GHSA-qcj7-g2j5-g7r3"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4qa-9fn6-97az"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4838?format=api",
            "vulnerability_id": "VCID-f73y-mjrg-yfc9",
            "summary": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000344.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000344.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59913",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59932",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59947",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59926",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59892",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59914",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59945",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5996",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59953",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59867",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59912",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5979",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59862",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000344"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000344",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000344"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588314",
                    "reference_id": "1588314",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588314"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000344",
                    "reference_id": "CVE-2016-1000344",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000344"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-2j2x-hx4g-2gf4",
                    "reference_id": "GHSA-2j2x-hx4g-2gf4",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-2j2x-hx4g-2gf4"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000344",
                "GHSA-2j2x-hx4g-2gf4"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f73y-mjrg-yfc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/5024?format=api",
            "vulnerability_id": "VCID-jr7u-m7gc-pydy",
            "summary": "In the Bouncy Castle JCE Provider version 1.55 and earlier the primary engine class used for AES was AESFastEngine. Due to the highly table driven approach used in the algorithm it turns out that if the data channel on the CPU can be monitored the lookup table accesses are sufficient to leak information on the AES key being used. There was also a leak in AESEngine although it was substantially less. AESEngine has been modified to remove any signs of leakage (testing carried out on Intel X86-64) and is now the primary AES class for the BC JCE provider from 1.56. Use of AESFastEngine is now only recommended where otherwise deemed appropriate.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000339.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.1",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000339.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000339",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78266",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78296",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78263",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78178",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78187",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78217",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.782",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78226",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78232",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78258",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78241",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78236",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01119",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78268",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000339"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000339",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000339"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/413b42f4d770456508585c830cfcde95f9b0e93b#diff-54656f860db94b867ba7542430cd2ef0"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/8a73f08931450c17c749af067b6a8185abdfd2c0#diff-494fb066bed02aeb76b6c005632943f2"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3727-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588695",
                    "reference_id": "1588695",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588695"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000339",
                    "reference_id": "CVE-2016-1000339",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000339"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-c8xf-m4ff-jcxj",
                    "reference_id": "GHSA-c8xf-m4ff-jcxj",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.3",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-c8xf-m4ff-jcxj"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1/",
                    "reference_id": "USN-3727-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3727-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000339",
                "GHSA-c8xf-m4ff-jcxj"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jr7u-m7gc-pydy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4540?format=api",
            "vulnerability_id": "VCID-jua2-2byr-t3cv",
            "summary": "In Bouncy Castle JCE Provider version 1.55 and earlier the DSA does not fully validate ASN.1 encoding of signature on verification. It is possible to inject extra elements in the sequence making up the signature and still have it validate, which in some cases may allow the introduction of 'invisible' data into a signed structure.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000338.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000338.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58916",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58895",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58912",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58931",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58897",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58934",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58793",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58868",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5889",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.58859",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00371",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5891",
                            "published_at": "2026-04-08T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000338"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000338",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000338"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bcgit/bc-java/commit/843c2e60f67d71faf81d236f448ebbe56c62c647"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/b0c3ce99d43d73a096268831d0d120ffc89eac7f#diff-3679f5a9d2b939d0d3ee1601a7774fb0"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0011",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20231006-0011"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20231006-0011/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20231006-0011/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3727-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588313",
                    "reference_id": "1588313",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588313"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:legion-of-the-bouncy-castle-java-crytography-api:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:6.4:-:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite:6.4:-:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite:6.4:-:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite_capsule:6.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:redhat:satellite_capsule:6.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:satellite_capsule:6.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000338",
                    "reference_id": "CVE-2016-1000338",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:P/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000338"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-4vhj-98r6-424h",
                    "reference_id": "GHSA-4vhj-98r6-424h",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-4vhj-98r6-424h"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1/",
                    "reference_id": "USN-3727-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3727-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000338",
                "GHSA-4vhj-98r6-424h"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jua2-2byr-t3cv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4693?format=api",
            "vulnerability_id": "VCID-ka8b-44hx-mkc5",
            "summary": "In the Bouncy Castle JCE Provider version 1.55 and earlier the ECIES implementation allowed the use of ECB mode. This mode is regarded as unsafe and support for it has been removed from the provider.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000352.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000352.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000352",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59914",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5979",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59867",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59892",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59862",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59912",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59926",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59947",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59932",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59913",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59953",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.5996",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00388",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59945",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000352"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000352",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000352"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/9385b0ebd277724b167fe1d1456e3c112112be1f"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588330",
                    "reference_id": "1588330",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588330"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000352",
                    "reference_id": "CVE-2016-1000352",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N"
                        },
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000352"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-w285-wf9q-5w69",
                    "reference_id": "GHSA-w285-wf9q-5w69",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.4",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-w285-wf9q-5w69"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000352",
                "GHSA-w285-wf9q-5w69"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ka8b-44hx-mkc5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4836?format=api",
            "vulnerability_id": "VCID-qr8s-5r61-skhw",
            "summary": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DHIES/ECIES CBC mode vulnerable to padding oracle attack. For BC 1.55 and older, in an environment where timings can be easily observed, it is possible with enough observations to identify when the decryption is failing due to padding.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000345.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000345.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74128",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74164",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74042",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74048",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74074",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74045",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74078",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74093",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74114",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74096",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7409",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74129",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00802",
                            "scoring_system": "epss",
                            "scoring_elements": "0.74137",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000345"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000345"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/21dcb3d9744c83dcf2ff8fcee06dbca7bfa4ef35#diff-4439ce586bf9a13bfec05c0d113b8098"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3727-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588323",
                    "reference_id": "1588323",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588323"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000345",
                    "reference_id": "CVE-2016-1000345",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000345"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-9gp4-qrff-c648",
                    "reference_id": "GHSA-9gp4-qrff-c648",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.9",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-9gp4-qrff-c648"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1/",
                    "reference_id": "USN-3727-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3727-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000345",
                "GHSA-9gp4-qrff-c648"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qr8s-5r61-skhw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4594?format=api",
            "vulnerability_id": "VCID-tnen-a68v-9bfk",
            "summary": "In the Bouncy Castle JCE Provider version 1.55 and earlier the DSA key pair generator generates a weak private key if used with default values. If the JCA key pair generator is not explicitly initialised with DSA parameters, 1.55 and earlier generates a private value assuming a 1024 bit key size. In earlier releases this can be dealt with by explicitly passing parameters to the key pair generator.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000343.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "2.9",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000343.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000343",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77806",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77832",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77799",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77805",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7771",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77717",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77744",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77727",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77755",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7776",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77786",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7777",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01074",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77769",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000343"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000343"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/50a53068c094d6cff37659da33c9b4505becd389#diff-5578e61500abb2b87b300d3114bdfd7d"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3727-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588721",
                    "reference_id": "1588721",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588721"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000343",
                    "reference_id": "CVE-2016-1000343",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000343"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-rrvx-pwf8-p59p",
                    "reference_id": "GHSA-rrvx-pwf8-p59p",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.5",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-rrvx-pwf8-p59p"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1/",
                    "reference_id": "USN-3727-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3727-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000343",
                "GHSA-rrvx-pwf8-p59p"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tnen-a68v-9bfk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4868?format=api",
            "vulnerability_id": "VCID-xzbt-bkdp-8bgh",
            "summary": "In the Bouncy Castle JCE Provider version 1.55 and earlier the other party DH public key is not fully validated. This can cause issues as invalid keys can be used to reveal details about the other party's private key where static Diffie-Hellman is in use. As of release 1.56 the key parameters are checked on agreement calculation.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2669",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2669"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2018:2927",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2018:2927"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000346.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.8",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
                        }
                    ],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-1000346.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76502",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76445",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76478",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76568",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76535",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76547",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76543",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7645",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76508",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76529",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76504",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.76492",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00962",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7646",
                            "published_at": "2026-04-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-1000346"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000346",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000346"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495"
                },
                {
                    "reference_url": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/bcgit/bc-java/commit/1127131c89021612c6eefa26dbe5714c194e7495#diff-d525a20b8acaed791ae2f0f770eb5937"
                },
                {
                    "reference_url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00009.html"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004"
                },
                {
                    "reference_url": "https://security.netapp.com/advisory/ntap-20181127-0004/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.netapp.com/advisory/ntap-20181127-0004/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://usn.ubuntu.com/3727-1"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuoct2020.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuoct2020.html"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588327",
                    "reference_id": "1588327",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1588327"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:bouncycastle:bc-java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000346",
                    "reference_id": "CVE-2016-1000346",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "4.3",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:N/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-1000346"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-fjqm-246c-mwqg",
                    "reference_id": "GHSA-fjqm-246c-mwqg",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "3.7",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        },
                        {
                            "value": "LOW",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-fjqm-246c-mwqg"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/3727-1/",
                    "reference_id": "USN-3727-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/3727-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/583390?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.56-1?distro=trixie",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582146?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.68-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.68-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582147?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.72-2?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-2j9r-6zbp-m3bz"
                        },
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        },
                        {
                            "vulnerability": "VCID-4rs8-tp92-p7ck"
                        },
                        {
                            "vulnerability": "VCID-abxq-7eq3-g7dp"
                        },
                        {
                            "vulnerability": "VCID-d5x5-hcjh-efcr"
                        },
                        {
                            "vulnerability": "VCID-e4j2-7rmt-17bf"
                        },
                        {
                            "vulnerability": "VCID-rary-mqyu-2yes"
                        },
                        {
                            "vulnerability": "VCID-sz15-payv-uyab"
                        },
                        {
                            "vulnerability": "VCID-wqgc-hd9r-zuek"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.72-2%3Fdistro=trixie"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/582148?format=api",
                    "purl": "pkg:deb/debian/bouncycastle@1.80-3?distro=trixie",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-37ce-hamd-wuda"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.80-3%3Fdistro=trixie"
                }
            ],
            "aliases": [
                "CVE-2016-1000346",
                "GHSA-fjqm-246c-mwqg"
            ],
            "risk_score": 2.1,
            "exploitability": "0.5",
            "weighted_severity": "4.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xzbt-bkdp-8bgh"
        }
    ],
    "risk_score": null,
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/bouncycastle@1.56-1%3Fdistro=trixie"
}