{"url":"http://public2.vulnerablecode.io/api/packages/572012?format=json","purl":"pkg:deb/debian/libgcrypt11@1.4.5-2%2Bsqueeze3","type":"deb","namespace":"debian","name":"libgcrypt11","version":"1.4.5-2+squeeze3","qualifiers":{},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":"1.5.0-5+deb7u4","latest_non_vulnerable_version":"1.5.0-5+deb7u4","affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49817?format=json","vulnerability_id":"VCID-1s7v-ch36-tbga","summary":"A vulnerability in Libgcrypt could allow a remote attacker to\n    extract ElGamal private key information.","references":[{"reference_url":"http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.gnupg.org/pipermail/gnupg-announce/2014q3/000352.html"},{"reference_url":"http://openwall.com/lists/oss-security/2014/08/16/2","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2014/08/16/2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5270.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-5270.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5270","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21922","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21967","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22125","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22174","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21957","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22093","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22109","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22067","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22008","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22006","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21955","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21815","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21804","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21791","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21699","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2177","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21846","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21817","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.2184","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-5270"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5270"},{"reference_url":"http://www.cs.tau.ac.il/~tromer/handsoff/","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.tau.ac.il/~tromer/handsoff/"},{"reference_url":"http://www.debian.org/security/2014/dsa-3024","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3024"},{"reference_url":"http://www.debian.org/security/2014/dsa-3073","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2014/dsa-3073"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128531","reference_id":"1128531","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1128531"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.4.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:1.5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:1.5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5270","reference_id":"CVE-2014-5270","reference_type":"","scores":[{"value":"2.1","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:L/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2014-5270"},{"reference_url":"https://security.gentoo.org/glsa/201408-10","reference_id":"GLSA-201408-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-10"},{"reference_url":"https://usn.ubuntu.com/2339-1/","reference_id":"USN-2339-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2339-1/"},{"reference_url":"https://usn.ubuntu.com/2339-2/","reference_id":"USN-2339-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2339-2/"},{"reference_url":"https://usn.ubuntu.com/2554-1/","reference_id":"USN-2554-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2554-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572013?format=json","purl":"pkg:deb/debian/libgcrypt11@1.5.0-5%2Bdeb7u4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgcrypt11@1.5.0-5%252Bdeb7u4"}],"aliases":["CVE-2014-5270"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1s7v-ch36-tbga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47197?format=json","vulnerability_id":"VCID-cbwg-mywq-y7af","summary":"Multiple vulnerabilities have been fixed in libgcrypt,the worst of\n    which results in predictable output from the random number generator.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-05/msg00027.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7511.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-7511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7511","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15192","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1505","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15143","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15133","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15177","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.153","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15191","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15243","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15213","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15174","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1511","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15012","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15021","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15073","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15111","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15115","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15057","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14927","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00067","scoring_system":"epss","scoring_elements":"0.20535","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-7511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:M/Au:N/C:P/I:P/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W2IL4PAEICHGA2XMQYRY3MIWHM4GMPAG/"},{"reference_url":"https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnupg.org/pipermail/gnupg-announce/2016q1/000384.html"},{"reference_url":"http://www.cs.tau.ac.IL/~tromer/ecdh/","reference_id":"","reference_type":"","scores":[],"url":"http://www.cs.tau.ac.IL/~tromer/ecdh/"},{"reference_url":"http://www.debian.org/security/2016/dsa-3474","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3474"},{"reference_url":"http://www.debian.org/security/2016/dsa-3478","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3478"},{"reference_url":"http://www.securityfocus.com/bid/83253","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/83253"},{"reference_url":"http://www.ubuntu.com/usn/USN-2896-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2896-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306184","reference_id":"1306184","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1306184"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:libgcrypt:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7511","reference_id":"CVE-2015-7511","reference_type":"","scores":[{"value":"1.9","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:P/I:N/A:N"},{"value":"2.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-7511"},{"reference_url":"https://security.gentoo.org/glsa/201610-04","reference_id":"GLSA-201610-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-04"},{"reference_url":"https://usn.ubuntu.com/2896-1/","reference_id":"USN-2896-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2896-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572013?format=json","purl":"pkg:deb/debian/libgcrypt11@1.5.0-5%2Bdeb7u4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgcrypt11@1.5.0-5%252Bdeb7u4"}],"aliases":["CVE-2015-7511"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbwg-mywq-y7af"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47196?format=json","vulnerability_id":"VCID-je5v-d5ua-6fhz","summary":"Multiple vulnerabilities have been fixed in libgcrypt,the worst of\n    which results in predictable output from the random number generator.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0837.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0837.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0837","reference_id":"","reference_type":"","scores":[{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71465","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71472","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71489","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71462","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71503","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71537","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71522","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.7155","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71555","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71533","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71584","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71592","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71596","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71582","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71617","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71651","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71618","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71648","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00677","scoring_system":"epss","scoring_elements":"0.71704","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-0837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1198147","reference_id":"1198147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1198147"},{"reference_url":"https://security.gentoo.org/glsa/201606-04","reference_id":"GLSA-201606-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201606-04"},{"reference_url":"https://security.gentoo.org/glsa/201610-04","reference_id":"GLSA-201610-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-04"},{"reference_url":"https://usn.ubuntu.com/2554-1/","reference_id":"USN-2554-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2554-1/"},{"reference_url":"https://usn.ubuntu.com/2555-1/","reference_id":"USN-2555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572013?format=json","purl":"pkg:deb/debian/libgcrypt11@1.5.0-5%2Bdeb7u4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgcrypt11@1.5.0-5%252Bdeb7u4"}],"aliases":["CVE-2015-0837"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-je5v-d5ua-6fhz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47195?format=json","vulnerability_id":"VCID-n3bv-fbnu-2bcx","summary":"Multiple vulnerabilities have been fixed in libgcrypt,the worst of\n    which results in predictable output from the random number generator.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3591.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3591.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3591","reference_id":"","reference_type":"","scores":[{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33797","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34122","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34461","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34489","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34356","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34399","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34428","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3443","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34391","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34367","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34402","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34389","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34348","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33976","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33956","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33872","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33751","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.3382","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33861","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33773","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3591"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1606"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:A/AC:H/Au:S/C:C/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1198145","reference_id":"1198145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1198145"},{"reference_url":"https://security.gentoo.org/glsa/201606-04","reference_id":"GLSA-201606-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201606-04"},{"reference_url":"https://security.gentoo.org/glsa/201610-04","reference_id":"GLSA-201610-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201610-04"},{"reference_url":"https://usn.ubuntu.com/2554-1/","reference_id":"USN-2554-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2554-1/"},{"reference_url":"https://usn.ubuntu.com/2555-1/","reference_id":"USN-2555-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2555-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572013?format=json","purl":"pkg:deb/debian/libgcrypt11@1.5.0-5%2Bdeb7u4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgcrypt11@1.5.0-5%252Bdeb7u4"}],"aliases":["CVE-2014-3591"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n3bv-fbnu-2bcx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42588?format=json","vulnerability_id":"VCID-uf47-ymx9-kycg","summary":"Multiple vulnerabilities have been discovered in GnuPG and\n    Libgcrypt, which may result in execution of arbitrary code, Denial of\n    Service, or the disclosure of private keys.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4242.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4242.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4242","reference_id":"","reference_type":"","scores":[{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25955","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25934","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25861","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26304","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26074","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26189","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26197","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26152","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26093","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26099","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26076","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.26041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2598","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25976","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25928","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.2582","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00093","scoring_system":"epss","scoring_elements":"0.25878","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36606","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36434","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4242"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=988589","reference_id":"988589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=988589"},{"reference_url":"https://security.gentoo.org/glsa/201402-24","reference_id":"GLSA-201402-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1457","reference_id":"RHSA-2013:1457","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1457"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1458","reference_id":"RHSA-2013:1458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1458"},{"reference_url":"https://usn.ubuntu.com/1923-1/","reference_id":"USN-1923-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1923-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/572013?format=json","purl":"pkg:deb/debian/libgcrypt11@1.5.0-5%2Bdeb7u4","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgcrypt11@1.5.0-5%252Bdeb7u4"}],"aliases":["CVE-2013-4242"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uf47-ymx9-kycg"}],"fixing_vulnerabilities":[],"risk_score":"1.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libgcrypt11@1.4.5-2%252Bsqueeze3"}