{"url":"http://public2.vulnerablecode.io/api/packages/123823?format=json","purl":"pkg:rpm/redhat/gnupg@1.4.5-18?arch=el5_10","type":"rpm","namespace":"redhat","name":"gnupg","version":"1.4.5-18","qualifiers":{"arch":"el5_10"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42587?format=json","vulnerability_id":"VCID-st4p-dn2v-dbg3","summary":"Multiple vulnerabilities have been discovered in GnuPG and\n    Libgcrypt, which may result in execution of arbitrary code, Denial of\n    Service, or the disclosure of private keys.","references":[{"reference_url":"http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commitdiff%3Bh=f0b33b6fb8e0586e9584a7a409dcc31263776a67","reference_id":"","reference_type":"","scores":[],"url":"http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commitdiff%3Bh=f0b33b6fb8e0586e9584a7a409dcc31263776a67"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095513.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095516.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095516.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1459.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1459.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6085.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6085","reference_id":"","reference_type":"","scores":[{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84826","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84679","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84809","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6085"},{"reference_url":"https://bugs.g10code.com/gnupg/issue1455","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.g10code.com/gnupg/issue1455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80990","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80990"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:001","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:001"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/01/01/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/01/01/6"},{"reference_url":"http://www.securityfocus.com/bid/57102","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57102"},{"reference_url":"http://www.ubuntu.com/usn/USN-1682-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1682-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697251","reference_id":"697251","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697251"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=891142","reference_id":"891142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=891142"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6085","reference_id":"CVE-2012-6085","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6085"},{"reference_url":"https://security.gentoo.org/glsa/201402-24","reference_id":"GLSA-201402-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1458","reference_id":"RHSA-2013:1458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1459","reference_id":"RHSA-2013:1459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1459"},{"reference_url":"https://usn.ubuntu.com/1682-1/","reference_id":"USN-1682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1682-1/"}],"fixed_packages":[],"aliases":["CVE-2012-6085"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-st4p-dn2v-dbg3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42588?format=json","vulnerability_id":"VCID-uf47-ymx9-kycg","summary":"Multiple vulnerabilities have been discovered in GnuPG and\n    Libgcrypt, which may result in execution of arbitrary code, Denial of\n    Service, or the disclosure of private keys.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4242.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4242","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2582","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25976","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26074","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26189","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26197","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26152","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26076","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36434","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=988589","reference_id":"988589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=988589"},{"reference_url":"https://security.gentoo.org/glsa/201402-24","reference_id":"GLSA-201402-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1457","reference_id":"RHSA-2013:1457","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1458","reference_id":"RHSA-2013:1458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1458"},{"reference_url":"https://usn.ubuntu.com/1923-1/","reference_id":"USN-1923-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1923-1/"}],"fixed_packages":[],"aliases":["CVE-2013-4242"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uf47-ymx9-kycg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42589?format=json","vulnerability_id":"VCID-vmyv-5rvk-akh3","summary":"Multiple vulnerabilities have been discovered in GnuPG and\n    Libgcrypt, which may result in execution of arbitrary code, Denial of\n    Service, or the disclosure of private keys.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4351.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4351.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4351","reference_id":"","reference_type":"","scores":[{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79698","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79705","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79726","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.7974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79747","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79769","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79753","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79746","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79773","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79778","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79808","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79815","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.7983","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79845","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1010137","reference_id":"1010137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1010137"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722724","reference_id":"722724","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=722724"},{"reference_url":"https://security.gentoo.org/glsa/201402-24","reference_id":"GLSA-201402-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1458","reference_id":"RHSA-2013:1458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1459","reference_id":"RHSA-2013:1459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1459"},{"reference_url":"https://usn.ubuntu.com/1987-1/","reference_id":"USN-1987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1987-1/"}],"fixed_packages":[],"aliases":["CVE-2013-4351"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vmyv-5rvk-akh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42590?format=json","vulnerability_id":"VCID-zytz-gsnc-yqh9","summary":"Multiple vulnerabilities have been discovered in GnuPG and\n    Libgcrypt, which may result in execution of arbitrary code, Denial of\n    Service, or the disclosure of private keys.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4402.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4402.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4402","reference_id":"","reference_type":"","scores":[{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89317","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89322","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89334","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89336","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89353","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89357","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89366","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89363","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89371","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89388","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89393","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89395","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04702","scoring_system":"epss","scoring_elements":"0.89404","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4402"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1015685","reference_id":"1015685","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1015685"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725433","reference_id":"725433","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=725433"},{"reference_url":"https://security.gentoo.org/glsa/201402-24","reference_id":"GLSA-201402-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1458","reference_id":"RHSA-2013:1458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1459","reference_id":"RHSA-2013:1459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1459"},{"reference_url":"https://usn.ubuntu.com/1987-1/","reference_id":"USN-1987-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1987-1/"}],"fixed_packages":[],"aliases":["CVE-2013-4402"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zytz-gsnc-yqh9"}],"fixing_vulnerabilities":[],"risk_score":"2.6","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gnupg@1.4.5-18%3Farch=el5_10"}