{"url":"http://public2.vulnerablecode.io/api/packages/74204?format=json","purl":"pkg:ebuild/net-libs/polarssl@1.3.0","type":"ebuild","namespace":"net-libs","name":"polarssl","version":"1.3.0","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"1.3.9-r1","latest_non_vulnerable_version":"1.3.9-r1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35769?format=json","vulnerability_id":"VCID-25uw-knhd-xkb4","summary":"Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which might allow a remote attacker to cause a Denial of Service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4623","reference_id":"","reference_type":"","scores":[{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71019","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71029","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71047","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71021","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71064","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71078","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71102","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71087","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.7107","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71104","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71161","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.7117","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71173","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71157","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71195","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.7123","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71193","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71221","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71275","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71285","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00659","scoring_system":"epss","scoring_elements":"0.71298","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915"},{"reference_url":"https://security.gentoo.org/glsa/201310-10","reference_id":"GLSA-201310-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-10"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74204?format=json","purl":"pkg:ebuild/net-libs/polarssl@1.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/polarssl@1.3.0"}],"aliases":["CVE-2013-4623"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-25uw-knhd-xkb4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35770?format=json","vulnerability_id":"VCID-3m1n-6f3m-mqgq","summary":"Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which might allow a remote attacker to cause a Denial of Service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5915","reference_id":"","reference_type":"","scores":[{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71694","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71701","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71719","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71692","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71731","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71742","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71766","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.7175","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71732","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71776","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71781","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71763","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71812","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71816","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.7182","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71806","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71839","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71873","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71837","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71866","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71923","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71932","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00688","scoring_system":"epss","scoring_elements":"0.71944","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5915"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4623"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5915"},{"reference_url":"https://security.gentoo.org/glsa/201310-10","reference_id":"GLSA-201310-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-10"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74204?format=json","purl":"pkg:ebuild/net-libs/polarssl@1.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/polarssl@1.3.0"}],"aliases":["CVE-2013-5915"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3m1n-6f3m-mqgq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35763?format=json","vulnerability_id":"VCID-b1m6-r1bv-d7gr","summary":"Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which might allow a remote attacker to cause a Denial of Service condition.","references":[{"reference_url":"http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/","reference_id":"","reference_type":"","scores":[],"url":"http://blog.fuseyism.com/index.php/2013/02/20/security-icedtea-2-1-6-2-2-6-2-3-7-for-openjdk-7-released/"},{"reference_url":"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-April/101366.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00020.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00011.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=136396549913849&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=136396549913849&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=136432043316835&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=136432043316835&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=136439120408139&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=136439120408139&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=136733161405818&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=136733161405818&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=137545771702053&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=137545771702053&w=2"},{"reference_url":"http://openwall.com/lists/oss-security/2013/02/05/24","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2013/02/05/24"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0587.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0587.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0782.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0782.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0783.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0783.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-0833.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-0833.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0169.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-0169.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0169","reference_id":"","reference_type":"","scores":[{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73578","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73534","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73557","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73528","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00773","scoring_system":"epss","scoring_elements":"0.73565","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74901","published_at":"2026-05-16T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74787","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74819","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74844","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74812","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74832","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74886","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74892","published_at":"2026-05-15T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74775","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0084","scoring_system":"epss","scoring_elements":"0.74784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76101","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76077","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76075","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76115","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76119","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00928","scoring_system":"epss","scoring_elements":"0.76103","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-0169"},{"reference_url":"https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf","reference_id":"","reference_type":"","scores":[],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-556833.pdf"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169"},{"reference_url":"http://secunia.com/advisories/53623","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/53623"},{"reference_url":"http://secunia.com/advisories/55108","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55108"},{"reference_url":"http://secunia.com/advisories/55139","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55139"},{"reference_url":"http://secunia.com/advisories/55322","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55322"},{"reference_url":"http://secunia.com/advisories/55350","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55350"},{"reference_url":"http://secunia.com/advisories/55351","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/55351"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201406-32.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.debian.org/debian-lts-announce/2018/09/msg00029.html"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18841"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19016"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19424"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19540"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19608"},{"reference_url":"https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released","reference_id":"","reference_type":"","scores":[],"url":"https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"},{"reference_url":"https://puppet.com/security/cve/cve-2013-0169","reference_id":"","reference_type":"","scores":[],"url":"https://puppet.com/security/cve/cve-2013-0169"},{"reference_url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001","reference_id":"","reference_type":"","scores":[],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c03883001"},{"reference_url":"http://support.apple.com/kb/HT5880","reference_id":"","reference_type":"","scores":[],"url":"http://support.apple.com/kb/HT5880"},{"reference_url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084","reference_id":"","reference_type":"","scores":[],"url":"https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0084"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21644047","reference_id":"","reference_type":"","scores":[],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21644047"},{"reference_url":"http://www.debian.org/security/2013/dsa-2621","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2621"},{"reference_url":"http://www.debian.org/security/2013/dsa-2622","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2622"},{"reference_url":"http://www.isg.rhul.ac.uk/tls/TLStiming.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.isg.rhul.ac.uk/tls/TLStiming.pdf"},{"reference_url":"http://www.kb.cert.org/vuls/id/737740","reference_id":"","reference_type":"","scores":[],"url":"http://www.kb.cert.org/vuls/id/737740"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:095","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:095"},{"reference_url":"http://www.matrixssl.org/news.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.matrixssl.org/news.html"},{"reference_url":"http://www.openssl.org/news/secadv_20130204.txt","reference_id":"","reference_type":"","scores":[],"url":"http://www.openssl.org/news/secadv_20130204.txt"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/javacpufeb2013update-1905892.html"},{"reference_url":"http://www.securityfocus.com/bid/57778","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57778"},{"reference_url":"http://www.securitytracker.com/id/1029190","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id/1029190"},{"reference_url":"http://www.splunk.com/view/SP-CAAAHXG","reference_id":"","reference_type":"","scores":[],"url":"http://www.splunk.com/view/SP-CAAAHXG"},{"reference_url":"http://www.ubuntu.com/usn/USN-1735-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1735-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA13-051A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA13-051A.html"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885","reference_id":"699885","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699885"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888","reference_id":"699888","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699888"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889","reference_id":"699889","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=699889"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=907589","reference_id":"907589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=907589"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update18:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update19:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update22:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update23:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update24:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update26:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update27:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update29:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update30:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update35:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update37:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update38:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.6.0:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:openjdk:1.7.0:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0169","reference_id":"CVE-2013-0169","reference_type":"","scores":[{"value":"2.6","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:H/Au:N/C:P/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-0169"},{"reference_url":"https://security.gentoo.org/glsa/201310-10","reference_id":"GLSA-201310-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-10"},{"reference_url":"https://security.gentoo.org/glsa/201312-03","reference_id":"GLSA-201312-03","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201312-03"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0273","reference_id":"RHSA-2013:0273","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0273"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0274","reference_id":"RHSA-2013:0274","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0274"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0275","reference_id":"RHSA-2013:0275","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0275"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0531","reference_id":"RHSA-2013:0531","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0531"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0532","reference_id":"RHSA-2013:0532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0587","reference_id":"RHSA-2013:0587","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0587"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0636","reference_id":"RHSA-2013:0636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0782","reference_id":"RHSA-2013:0782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0783","reference_id":"RHSA-2013:0783","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0822","reference_id":"RHSA-2013:0822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0823","reference_id":"RHSA-2013:0823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0833","reference_id":"RHSA-2013:0833","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0833"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0855","reference_id":"RHSA-2013:0855","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1013","reference_id":"RHSA-2013:1013","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1013"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0416","reference_id":"RHSA-2014:0416","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0416"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:4298","reference_id":"RHSA-2020:4298","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:4298"},{"reference_url":"https://usn.ubuntu.com/1732-1/","reference_id":"USN-1732-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1732-1/"},{"reference_url":"https://usn.ubuntu.com/1732-3/","reference_id":"USN-1732-3","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1732-3/"},{"reference_url":"https://usn.ubuntu.com/1735-1/","reference_id":"USN-1735-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1735-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74204?format=json","purl":"pkg:ebuild/net-libs/polarssl@1.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/polarssl@1.3.0"}],"aliases":["CVE-2013-0169"],"risk_score":1.1,"exploitability":"0.5","weighted_severity":"2.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b1m6-r1bv-d7gr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35762?format=json","vulnerability_id":"VCID-sreq-1aap-8fac","summary":"Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which might allow a remote attacker to cause a Denial of Service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2130","reference_id":"","reference_type":"","scores":[{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22298","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22464","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2251","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22456","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22415","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2236","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22378","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22374","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22322","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22173","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.2216","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22153","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22049","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22129","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22208","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22177","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22199","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22282","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.223","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22296","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-2130"},{"reference_url":"https://security.gentoo.org/glsa/201310-10","reference_id":"GLSA-201310-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-10"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74204?format=json","purl":"pkg:ebuild/net-libs/polarssl@1.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/polarssl@1.3.0"}],"aliases":["CVE-2012-2130"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sreq-1aap-8fac"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35761?format=json","vulnerability_id":"VCID-wcc9-pd53-m3hh","summary":"Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which might allow a remote attacker to cause a Denial of Service condition.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1923","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57875","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57959","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57978","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57954","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5801","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58011","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58028","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58006","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57985","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58016","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58014","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57992","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57956","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57972","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57955","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57912","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58015","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57965","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57994","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58064","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58078","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58085","published_at":"2026-05-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2011-1923"},{"reference_url":"https://security.gentoo.org/glsa/201310-10","reference_id":"GLSA-201310-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-10"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74204?format=json","purl":"pkg:ebuild/net-libs/polarssl@1.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/polarssl@1.3.0"}],"aliases":["CVE-2011-1923"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wcc9-pd53-m3hh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35766?format=json","vulnerability_id":"VCID-wykm-ts1d-n3f2","summary":"Multiple vulnerabilities have been found in PolarSSL, the worst of\n    which might allow a remote attacker to cause a Denial of Service condition.","references":[{"reference_url":"http://openwall.com/lists/oss-security/2013/02/05/24","reference_id":"","reference_type":"","scores":[],"url":"http://openwall.com/lists/oss-security/2013/02/05/24"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1621","reference_id":"","reference_type":"","scores":[{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71911","published_at":"2026-05-16T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71659","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71665","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71683","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71707","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.7173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71714","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.7174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71746","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71728","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71777","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71782","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71788","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71773","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71806","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71839","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71805","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71833","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71891","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00686","scoring_system":"epss","scoring_elements":"0.71899","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-1621"},{"reference_url":"https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released","reference_id":"","reference_type":"","scores":[],"url":"https://polarssl.org/tech-updates/releases/polarssl-1.2.5-released"},{"reference_url":"http://www.debian.org/security/2013/dsa-2622","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2013/dsa-2622"},{"reference_url":"http://www.isg.rhul.ac.uk/tls/TLStiming.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www.isg.rhul.ac.uk/tls/TLStiming.pdf"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.14.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:0.99:pre5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc0:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.0:rc1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.1.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.1.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:polarssl:polarssl:1.2.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1621","reference_id":"CVE-2013-1621","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-1621"},{"reference_url":"https://security.gentoo.org/glsa/201310-10","reference_id":"GLSA-201310-10","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201310-10"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/74204?format=json","purl":"pkg:ebuild/net-libs/polarssl@1.3.0","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/polarssl@1.3.0"}],"aliases":["CVE-2013-1621"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wykm-ts1d-n3f2"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/polarssl@1.3.0"}