Lookup for vulnerable packages by Package URL.

GET /api/packages/571255?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/571255?format=api",
    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb6u5",
    "type": "deb",
    "namespace": "debian",
    "name": "polarssl",
    "version": "1.2.9-1~deb6u5",
    "qualifiers": {},
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": "1.3.9-2.1+deb8u3",
    "latest_non_vulnerable_version": "1.3.9-2.1+deb8u3",
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35769?format=api",
            "vulnerability_id": "VCID-25uw-knhd-xkb4",
            "summary": "Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which might allow a remote attacker to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71019",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71029",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71047",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71021",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71064",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71078",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71102",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71087",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7107",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71117",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71124",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71104",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71161",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7117",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71173",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71157",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00659",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71195",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201310-10",
                    "reference_id": "GLSA-201310-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201310-10"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571256?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-cbdd-4dr5-53f6"
                        },
                        {
                            "vulnerability": "VCID-gzvn-8b6y-xqeb"
                        },
                        {
                            "vulnerability": "VCID-p4mh-ztr8-k7d6"
                        },
                        {
                            "vulnerability": "VCID-rmzm-2q2n-zkdg"
                        },
                        {
                            "vulnerability": "VCID-wc33-4jtc-7ueu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb7u6"
                }
            ],
            "aliases": [
                "CVE-2013-4623"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25uw-knhd-xkb4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/35770?format=api",
            "vulnerability_id": "VCID-3m1n-6f3m-mqgq",
            "summary": "Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which might allow a remote attacker to cause a Denial of Service condition.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71694",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71701",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71719",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71692",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71731",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71742",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71766",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7175",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71732",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71776",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71781",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71763",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71812",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71816",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7182",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71806",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00688",
                            "scoring_system": "epss",
                            "scoring_elements": "0.71839",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5915"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201310-10",
                    "reference_id": "GLSA-201310-10",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201310-10"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571256?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-cbdd-4dr5-53f6"
                        },
                        {
                            "vulnerability": "VCID-gzvn-8b6y-xqeb"
                        },
                        {
                            "vulnerability": "VCID-p4mh-ztr8-k7d6"
                        },
                        {
                            "vulnerability": "VCID-rmzm-2q2n-zkdg"
                        },
                        {
                            "vulnerability": "VCID-wc33-4jtc-7ueu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb7u6"
                }
            ],
            "aliases": [
                "CVE-2013-5915"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3m1n-6f3m-mqgq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61258?format=api",
            "vulnerability_id": "VCID-cbdd-4dr5-53f6",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00009.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2016-08/msg00009.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8086",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80685",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80694",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80715",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80711",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8074",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80748",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80765",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80749",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80741",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80778",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8078",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80781",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80804",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80808",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80822",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01445",
                            "scoring_system": "epss",
                            "scoring_elements": "0.80838",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-8036"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036"
                },
                {
                    "reference_url": "https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf"
                },
                {
                    "reference_url": "https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/"
                },
                {
                    "reference_url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3468"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8036",
                    "reference_id": "CVE-2015-8036",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-8036"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571256?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-cbdd-4dr5-53f6"
                        },
                        {
                            "vulnerability": "VCID-gzvn-8b6y-xqeb"
                        },
                        {
                            "vulnerability": "VCID-p4mh-ztr8-k7d6"
                        },
                        {
                            "vulnerability": "VCID-rmzm-2q2n-zkdg"
                        },
                        {
                            "vulnerability": "VCID-wc33-4jtc-7ueu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036240?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.3.9-2.1%2Bdeb8u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.3.9-2.1%252Bdeb8u3"
                }
            ],
            "aliases": [
                "CVE-2015-8036"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbdd-4dr5-53f6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/39979?format=api",
            "vulnerability_id": "VCID-gzvn-8b6y-xqeb",
            "summary": "Multiple vulnerabilities have been found in mbed TLS, the worst of\n    which could lead to the remote execution of arbitrary code.",
            "references": [
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170317.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-November/170317.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169625.html"
                },
                {
                    "reference_url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169765.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169765.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00013.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00013.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00119.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://lists.opensuse.org/opensuse-updates/2015-12/msg00119.html"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83974",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83792",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83806",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8382",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83822",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83846",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83852",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83869",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83863",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83858",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83891",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83892",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83918",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83925",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02049",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83952",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5291"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5291"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8036"
                },
                {
                    "reference_url": "https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://guidovranken.files.wordpress.com/2015/10/cve-2015-5291.pdf"
                },
                {
                    "reference_url": "https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://guidovranken.wordpress.com/2015/10/07/cve-2015-5291/"
                },
                {
                    "reference_url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2015-01"
                },
                {
                    "reference_url": "http://www.debian.org/security/2016/dsa-3468",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2016/dsa-3468"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5291",
                    "reference_id": "CVE-2015-5291",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "6.8",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5291"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201706-18",
                    "reference_id": "GLSA-201706-18",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201706-18"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571256?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-cbdd-4dr5-53f6"
                        },
                        {
                            "vulnerability": "VCID-gzvn-8b6y-xqeb"
                        },
                        {
                            "vulnerability": "VCID-p4mh-ztr8-k7d6"
                        },
                        {
                            "vulnerability": "VCID-rmzm-2q2n-zkdg"
                        },
                        {
                            "vulnerability": "VCID-wc33-4jtc-7ueu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb7u6"
                },
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036240?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.3.9-2.1%2Bdeb8u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.3.9-2.1%252Bdeb8u3"
                }
            ],
            "aliases": [
                "CVE-2015-5291"
            ],
            "risk_score": 3.0,
            "exploitability": "0.5",
            "weighted_severity": "6.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gzvn-8b6y-xqeb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62055?format=api",
            "vulnerability_id": "VCID-p4mh-ztr8-k7d6",
            "summary": "Multiple vulnerabilities have been found in mbed TLS, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87773",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87656",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87666",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87679",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8768",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87701",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87718",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87712",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8771",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87724",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87721",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87739",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87745",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87744",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.03563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87758",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0488"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18187"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0488"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890287",
                    "reference_id": "890287",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890287"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201802-15",
                    "reference_id": "ASA-201802-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201802-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-617",
                    "reference_id": "AVG-617",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-617"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-19",
                    "reference_id": "GLSA-201804-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-19"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4267-1/",
                    "reference_id": "USN-4267-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4267-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036240?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.3.9-2.1%2Bdeb8u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.3.9-2.1%252Bdeb8u3"
                }
            ],
            "aliases": [
                "CVE-2018-0488"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p4mh-ztr8-k7d6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/58187?format=api",
            "vulnerability_id": "VCID-puv9-ut8m-z7h3",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65002",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65053",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65079",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65042",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65091",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65105",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65124",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65113",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65085",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65121",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6513",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65115",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65131",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65145",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65144",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65127",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.0048",
                            "scoring_system": "epss",
                            "scoring_elements": "0.65174",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8628"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8628",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8628"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571256?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-cbdd-4dr5-53f6"
                        },
                        {
                            "vulnerability": "VCID-gzvn-8b6y-xqeb"
                        },
                        {
                            "vulnerability": "VCID-p4mh-ztr8-k7d6"
                        },
                        {
                            "vulnerability": "VCID-rmzm-2q2n-zkdg"
                        },
                        {
                            "vulnerability": "VCID-wc33-4jtc-7ueu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb7u6"
                }
            ],
            "aliases": [
                "CVE-2014-8628"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-puv9-ut8m-z7h3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62054?format=api",
            "vulnerability_id": "VCID-rmzm-2q2n-zkdg",
            "summary": "Multiple vulnerabilities have been found in mbed TLS, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89897",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89806",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89809",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89823",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89827",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89844",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8985",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89856",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89854",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89847",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89861",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89855",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8987",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89869",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.05116",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89882",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2018-0487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18187"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0488"
                },
                {
                    "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890288",
                    "reference_id": "890288",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=890288"
                },
                {
                    "reference_url": "https://security.archlinux.org/ASA-201802-15",
                    "reference_id": "ASA-201802-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.archlinux.org/ASA-201802-15"
                },
                {
                    "reference_url": "https://security.archlinux.org/AVG-617",
                    "reference_id": "AVG-617",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "High",
                            "scoring_system": "archlinux",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.archlinux.org/AVG-617"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-19",
                    "reference_id": "GLSA-201804-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-19"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4267-1/",
                    "reference_id": "USN-4267-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4267-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036240?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.3.9-2.1%2Bdeb8u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.3.9-2.1%252Bdeb8u3"
                }
            ],
            "aliases": [
                "CVE-2018-0487"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rmzm-2q2n-zkdg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/57852?format=api",
            "vulnerability_id": "VCID-uxvk-gmbr-mbbn",
            "summary": "security update",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67512",
                            "published_at": "2026-05-07T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67359",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67395",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67416",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67447",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67461",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67483",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6747",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67437",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67473",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67485",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67465",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67482",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67493",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67494",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00535",
                            "scoring_system": "epss",
                            "scoring_elements": "0.67468",
                            "published_at": "2026-05-05T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-4911"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4911",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4911"
                },
                {
                    "reference_url": "http://secunia.com/advisories/60215",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/60215"
                },
                {
                    "reference_url": "https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-02",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://polarssl.org/tech-updates/security-advisories/polarssl-security-advisory-2014-02"
                },
                {
                    "reference_url": "http://www.debian.org/security/2014/dsa-2981",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.debian.org/security/2014/dsa-2981"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.2.9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.0:alpha1:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.0:alpha1:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.0:alpha1:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.0:rc0:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.0:rc0:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.0:rc0:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:polarssl:polarssl:1.3.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.3.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4911",
                    "reference_id": "CVE-2014-4911",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "5.0",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-4911"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571256?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-cbdd-4dr5-53f6"
                        },
                        {
                            "vulnerability": "VCID-gzvn-8b6y-xqeb"
                        },
                        {
                            "vulnerability": "VCID-p4mh-ztr8-k7d6"
                        },
                        {
                            "vulnerability": "VCID-rmzm-2q2n-zkdg"
                        },
                        {
                            "vulnerability": "VCID-wc33-4jtc-7ueu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb7u6"
                }
            ],
            "aliases": [
                "CVE-2014-4911"
            ],
            "risk_score": 2.2,
            "exploitability": "0.5",
            "weighted_severity": "4.5",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uxvk-gmbr-mbbn"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/55661?format=api",
            "vulnerability_id": "VCID-v24d-6cad-5ba4",
            "summary": "several",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86181",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86194",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86213",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86225",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86239",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86237",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86233",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86249",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86255",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86248",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86268",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86278",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86277",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86296",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.02853",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86318",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571256?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-cbdd-4dr5-53f6"
                        },
                        {
                            "vulnerability": "VCID-gzvn-8b6y-xqeb"
                        },
                        {
                            "vulnerability": "VCID-p4mh-ztr8-k7d6"
                        },
                        {
                            "vulnerability": "VCID-rmzm-2q2n-zkdg"
                        },
                        {
                            "vulnerability": "VCID-wc33-4jtc-7ueu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb7u6"
                }
            ],
            "aliases": [
                "CVE-2013-5914"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v24d-6cad-5ba4"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49283?format=api",
            "vulnerability_id": "VCID-vppk-237y-k3fk",
            "summary": "Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which may allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1182",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82208",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82221",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82241",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82237",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82264",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82271",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8229",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82284",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82278",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82313",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82315",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82336",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82347",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82351",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82369",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.01697",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8239",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-1182"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1182",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1182"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201801-15",
                    "reference_id": "GLSA-201801-15",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201801-15"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/571256?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.2.9-1~deb7u6",
                    "is_vulnerable": true,
                    "affected_by_vulnerabilities": [
                        {
                            "vulnerability": "VCID-cbdd-4dr5-53f6"
                        },
                        {
                            "vulnerability": "VCID-gzvn-8b6y-xqeb"
                        },
                        {
                            "vulnerability": "VCID-p4mh-ztr8-k7d6"
                        },
                        {
                            "vulnerability": "VCID-rmzm-2q2n-zkdg"
                        },
                        {
                            "vulnerability": "VCID-wc33-4jtc-7ueu"
                        }
                    ],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb7u6"
                }
            ],
            "aliases": [
                "CVE-2015-1182"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vppk-237y-k3fk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/62053?format=api",
            "vulnerability_id": "VCID-wc33-4jtc-7ueu",
            "summary": "Multiple vulnerabilities have been found in mbed TLS, the worst of\n    which could allow remote attackers to execute arbitrary code.",
            "references": [
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68287",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68307",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68327",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68303",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68354",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68371",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68398",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68386",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68353",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68392",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68405",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68383",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6843",
                            "published_at": "2026-04-24T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68434",
                            "published_at": "2026-04-26T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68438",
                            "published_at": "2026-04-29T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68415",
                            "published_at": "2026-05-05T12:55:00Z"
                        },
                        {
                            "value": "0.00563",
                            "scoring_system": "epss",
                            "scoring_elements": "0.68457",
                            "published_at": "2026-05-07T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2017-18187"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18187",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18187"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0487",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0487"
                },
                {
                    "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0488",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0488"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201804-19",
                    "reference_id": "GLSA-201804-19",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201804-19"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/4267-1/",
                    "reference_id": "USN-4267-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/4267-1/"
                }
            ],
            "fixed_packages": [
                {
                    "url": "http://public2.vulnerablecode.io/api/packages/1036240?format=api",
                    "purl": "pkg:deb/debian/polarssl@1.3.9-2.1%2Bdeb8u3",
                    "is_vulnerable": false,
                    "affected_by_vulnerabilities": [],
                    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.3.9-2.1%252Bdeb8u3"
                }
            ],
            "aliases": [
                "CVE-2017-18187"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wc33-4jtc-7ueu"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/polarssl@1.2.9-1~deb6u5"
}