{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","type":"deb","namespace":"debian","name":"libtasn1-6","version":"4.21.0-2","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49801?format=json","vulnerability_id":"VCID-23qz-mpaz-3qc5","summary":"Multiple vulnerabilities have been found in GNU Libtasn1, the worst\n    of which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6891.json","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-6891.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6891","reference_id":"","reference_type":"","scores":[{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78703","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78937","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78869","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78884","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7888","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78899","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7871","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7874","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78722","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78748","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78755","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78779","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78761","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78781","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78775","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78803","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.7881","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78828","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01181","scoring_system":"epss","scoring_elements":"0.78847","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-6891"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6891"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv2","scoring_elements":"AV:L/AC:M/Au:N/C:N/I:P/A:P"},{"value":"5.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1456763","reference_id":"1456763","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1456763"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863186","reference_id":"863186","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=863186"},{"reference_url":"https://security.archlinux.org/ASA-201706-10","reference_id":"ASA-201706-10","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-10"},{"reference_url":"https://security.archlinux.org/ASA-201706-3","reference_id":"ASA-201706-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-201706-3"},{"reference_url":"https://security.archlinux.org/AVG-285","reference_id":"AVG-285","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-285"},{"reference_url":"https://security.archlinux.org/AVG-286","reference_id":"AVG-286","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-286"},{"reference_url":"https://security.gentoo.org/glsa/201710-11","reference_id":"GLSA-201710-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-11"},{"reference_url":"https://usn.ubuntu.com/3309-1/","reference_id":"USN-3309-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3309-1/"},{"reference_url":"https://usn.ubuntu.com/3309-2/","reference_id":"USN-3309-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3309-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928780?format=json","purl":"pkg:deb/debian/libtasn1-6@4.10-1.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.10-1.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2017-6891"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-23qz-mpaz-3qc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65191?format=json","vulnerability_id":"VCID-3gx3-2gs5-2yab","summary":"libtasn1: libtasn1: Denial of Service via stack-based buffer overflow in asn1_expend_octet_string","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13151.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13151.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13151","reference_id":"","reference_type":"","scores":[{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19336","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19393","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19298","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19305","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19318","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19218","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19206","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19163","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19056","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19138","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19586","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19436","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19441","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23522","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23606","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23554","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0008","scoring_system":"epss","scoring_elements":"0.23506","published_at":"2026-05-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13151"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13151","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13151"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125063","reference_id":"1125063","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1125063"},{"reference_url":"https://gitlab.com/gnutls/libtasn1/-/merge_requests/121","reference_id":"121","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-07T21:32:59Z/"}],"url":"https://gitlab.com/gnutls/libtasn1/-/merge_requests/121"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2427698","reference_id":"2427698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2427698"},{"reference_url":"https://gitlab.com/gnutls/libtasn1","reference_id":"libtasn1","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-01-07T21:32:59Z/"}],"url":"https://gitlab.com/gnutls/libtasn1"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:7500","reference_id":"RHSA-2026:7500","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:7500"},{"reference_url":"https://usn.ubuntu.com/7954-1/","reference_id":"USN-7954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7954-1/"},{"reference_url":"https://usn.ubuntu.com/7954-2/","reference_id":"USN-7954-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7954-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2025-13151"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3gx3-2gs5-2yab"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34497?format=json","vulnerability_id":"VCID-6hjd-vqrx-9kd3","summary":"Multiple vulnerabilities have been found in libtasn1, the worst of\n    which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3622.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-3622.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3622","reference_id":"","reference_type":"","scores":[{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.907","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90706","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90716","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90744","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90752","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90748","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90768","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90765","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90764","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90776","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.9077","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90788","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90806","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90817","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90815","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90825","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06062","scoring_system":"epss","scoring_elements":"0.90837","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-3622"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.5","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:S/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1218141","reference_id":"1218141","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1218141"},{"reference_url":"https://security.gentoo.org/glsa/201509-04","reference_id":"GLSA-201509-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1860","reference_id":"RHSA-2017:1860","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1860"},{"reference_url":"https://usn.ubuntu.com/2604-1/","reference_id":"USN-2604-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2604-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928777?format=json","purl":"pkg:deb/debian/libtasn1-6@4.4-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.4-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2015-3622"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6hjd-vqrx-9kd3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/71898?format=json","vulnerability_id":"VCID-7jv7-xesq-cuht","summary":"libtasn1: Inefficient DER Decoding in libtasn1 Leading to Potential Remote DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12133.json","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-12133.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-12133","reference_id":"","reference_type":"","scores":[{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.57001","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00343","scoring_system":"epss","scoring_elements":"0.56939","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64837","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64834","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64823","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64794","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64832","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64843","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64899","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64929","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64885","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64761","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.6479","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64753","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64802","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00475","scoring_system":"epss","scoring_elements":"0.64817","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65539","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65512","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.6553","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00488","scoring_system":"epss","scoring_elements":"0.65541","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-12133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12133"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095406","reference_id":"1095406","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1095406"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344611","reference_id":"2344611","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344611"},{"reference_url":"https://gitlab.com/gnutls/libtasn1/-/issues/52","reference_id":"52","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://gitlab.com/gnutls/libtasn1/-/issues/52"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9","reference_id":"cpe:/a:redhat:discovery:1.14::el9","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:discovery:1.14::el9"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4","reference_id":"cpe:/a:redhat:openshift:4","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:openshift:4"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10","reference_id":"cpe:/o:redhat:enterprise_linux:10","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:10"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:8::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:8::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos","reference_id":"cpe:/o:redhat:enterprise_linux:9::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:9::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos","reference_id":"cpe:/o:redhat:rhel_e4s:9.2::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_e4s:9.2::baseos"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos","reference_id":"cpe:/o:redhat:rhel_eus:9.4::baseos","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_eus:9.4::baseos"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2024-12133","reference_id":"CVE-2024-12133","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2024-12133"},{"reference_url":"https://gitlab.com/gnutls/libtasn1/-/blob/master/doc/security/CVE-2024-12133.md","reference_id":"CVE-2024-12133.md","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://gitlab.com/gnutls/libtasn1/-/blob/master/doc/security/CVE-2024-12133.md"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17347","reference_id":"RHSA-2025:17347","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:17347"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4049","reference_id":"RHSA-2025:4049","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:4049"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7077","reference_id":"RHSA-2025:7077","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:7077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8021","reference_id":"RHSA-2025:8021","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8021"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8385","reference_id":"RHSA-2025:8385","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-02-10T16:25:41Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:8385"},{"reference_url":"https://usn.ubuntu.com/7275-1/","reference_id":"USN-7275-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7275-1/"},{"reference_url":"https://usn.ubuntu.com/7275-2/","reference_id":"USN-7275-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7275-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928784?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928785?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2024-12133"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7jv7-xesq-cuht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/83219?format=json","vulnerability_id":"VCID-7yd7-bx5w-cqcp","summary":"libtasn1: Infinite loop in _asn1_expand_object_id(ptree) leads to memory exhaustion","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000654.json","reference_id":"","reference_type":"","scores":[{"value":"4.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-1000654.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000654","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31654","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31786","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3183","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31701","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3173","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31734","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31694","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31658","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31691","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31637","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3146","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31333","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31252","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.311","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3117","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31177","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31088","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31111","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31181","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-1000654"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000654"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621972","reference_id":"1621972","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1621972"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906768","reference_id":"906768","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=906768"},{"reference_url":"https://usn.ubuntu.com/5352-1/","reference_id":"USN-5352-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5352-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928781?format=json","purl":"pkg:deb/debian/libtasn1-6@4.14-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.14-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2018-1000654"],"risk_score":1.8,"exploitability":"0.5","weighted_severity":"3.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7yd7-bx5w-cqcp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63629?format=json","vulnerability_id":"VCID-a3w8-2vpj-t7hn","summary":"security update","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6003.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-6003.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6003","reference_id":"","reference_type":"","scores":[{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81526","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.8156","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81587","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81592","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81599","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.8163","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81633","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81667","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81671","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81687","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81709","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81733","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81732","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81749","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01584","scoring_system":"epss","scoring_elements":"0.81789","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2018-6003"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535578","reference_id":"1535578","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1535578"},{"reference_url":"https://usn.ubuntu.com/3547-1/","reference_id":"USN-3547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928782?format=json","purl":"pkg:deb/debian/libtasn1-6@4.13-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.13-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2018-6003"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a3w8-2vpj-t7hn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/39087?format=json","vulnerability_id":"VCID-erj4-xz6g-c7ey","summary":"A vulnerability in Libtasn1 allows remote attackers to cause a\n    Denial of Service condition.","references":[{"reference_url":"http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=a6e0a0b58f5cdaf4e9beca5bce69c09808cbb625"},{"reference_url":"http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e","reference_id":"","reference_type":"","scores":[],"url":"http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=f435825c0f527a8e52e6ffbc3ad0bc60531d537e"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182299.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182907.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2016-April/183221.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00047.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-updates/2016-06/msg00097.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4008.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-4008.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4008","reference_id":"","reference_type":"","scores":[{"value":"0.0429","scoring_system":"epss","scoring_elements":"0.88954","published_at":"2026-05-14T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89835","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89831","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89839","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89749","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89766","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89773","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89779","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89778","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.8973","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89787","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89781","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89795","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89796","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.8981","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05049","scoring_system":"epss","scoring_elements":"0.89825","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2016-4008"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4008"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html","reference_id":"","reference_type":"","scores":[],"url":"https://lists.gnu.org/archive/html/help-libtasn1/2016-04/msg00009.html"},{"reference_url":"http://www.debian.org/security/2016/dsa-3568","reference_id":"","reference_type":"","scores":[],"url":"http://www.debian.org/security/2016/dsa-3568"},{"reference_url":"http://www.openwall.com/lists/oss-security/2016/04/11/3","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2016/04/11/3"},{"reference_url":"http://www.ubuntu.com/usn/USN-2957-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2957-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2957-2","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-2957-2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1325965","reference_id":"1325965","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1325965"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnu:libtasn1:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4008","reference_id":"CVE-2016-4008","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2016-4008"},{"reference_url":"https://security.gentoo.org/glsa/201703-05","reference_id":"GLSA-201703-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201703-05"},{"reference_url":"https://usn.ubuntu.com/2957-1/","reference_id":"USN-2957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2957-1/"},{"reference_url":"https://usn.ubuntu.com/2957-2/","reference_id":"USN-2957-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2957-2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928778?format=json","purl":"pkg:deb/debian/libtasn1-6@4.8-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.8-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2016-4008"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-erj4-xz6g-c7ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35992?format=json","vulnerability_id":"VCID-f69k-zy45-uued","summary":"Multiple vulnerabilities have been discovered in GNU Libtasn1, the\n    worse of which can allow a context-dependent attacker to cause a Denial of\n    Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3469.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3469.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3469","reference_id":"","reference_type":"","scores":[{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92418","published_at":"2026-04-01T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92433","published_at":"2026-04-04T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92436","published_at":"2026-04-07T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92447","published_at":"2026-04-08T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92458","published_at":"2026-04-11T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.9246","published_at":"2026-04-12T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92459","published_at":"2026-04-13T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92469","published_at":"2026-04-18T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92472","published_at":"2026-04-29T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92474","published_at":"2026-04-24T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92476","published_at":"2026-04-26T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92482","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92492","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92502","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92506","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92512","published_at":"2026-05-12T12:55:00Z"},{"value":"0.08667","scoring_system":"epss","scoring_elements":"0.92538","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3469"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102329","reference_id":"1102329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102329"},{"reference_url":"https://security.gentoo.org/glsa/201408-09","reference_id":"GLSA-201408-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0594","reference_id":"RHSA-2014:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0596","reference_id":"RHSA-2014:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0687","reference_id":"RHSA-2014:0687","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0687"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0815","reference_id":"RHSA-2014:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0815"},{"reference_url":"https://usn.ubuntu.com/2294-1/","reference_id":"USN-2294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2294-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928772?format=json","purl":"pkg:deb/debian/libtasn1-6@3.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@3.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2014-3469"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f69k-zy45-uued"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35990?format=json","vulnerability_id":"VCID-k6ay-ezmy-gkgj","summary":"Multiple vulnerabilities have been discovered in GNU Libtasn1, the\n    worse of which can allow a context-dependent attacker to cause a Denial of\n    Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3467.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3467.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3467","reference_id":"","reference_type":"","scores":[{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91289","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91294","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91305","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91312","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.9133","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91337","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91339","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91338","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91363","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91362","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91364","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91373","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91372","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91386","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91402","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91412","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.9141","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.9142","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06825","scoring_system":"epss","scoring_elements":"0.91428","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102022","reference_id":"1102022","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102022"},{"reference_url":"https://security.gentoo.org/glsa/201408-09","reference_id":"GLSA-201408-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0594","reference_id":"RHSA-2014:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0596","reference_id":"RHSA-2014:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0687","reference_id":"RHSA-2014:0687","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0687"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0815","reference_id":"RHSA-2014:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0815"},{"reference_url":"https://usn.ubuntu.com/2294-1/","reference_id":"USN-2294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2294-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928772?format=json","purl":"pkg:deb/debian/libtasn1-6@3.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@3.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2014-3467"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k6ay-ezmy-gkgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49800?format=json","vulnerability_id":"VCID-pysb-84hg-gqhh","summary":"Multiple vulnerabilities have been found in GNU Libtasn1, the worst\n    of which may allow remote attackers to execute arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10790.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2017-10790.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10790","reference_id":"","reference_type":"","scores":[{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60208","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60451","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60365","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60391","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60285","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6031","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60278","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60328","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60343","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60364","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60351","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60373","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.6037","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60341","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60356","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60302","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60348","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00394","scoring_system":"epss","scoring_elements":"0.60407","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2017-10790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10790"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6003"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473192","reference_id":"1473192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1473192"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867398","reference_id":"867398","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=867398"},{"reference_url":"https://security.gentoo.org/glsa/201710-11","reference_id":"GLSA-201710-11","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201710-11"},{"reference_url":"https://usn.ubuntu.com/3547-1/","reference_id":"USN-3547-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/3547-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928779?format=json","purl":"pkg:deb/debian/libtasn1-6@4.12-2.1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.12-2.1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2017-10790"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pysb-84hg-gqhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/35991?format=json","vulnerability_id":"VCID-qawp-nzw5-8ud5","summary":"Multiple vulnerabilities have been discovered in GNU Libtasn1, the\n    worse of which can allow a context-dependent attacker to cause a Denial of\n    Service condition.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3468.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3468.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3468","reference_id":"","reference_type":"","scores":[{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93303","published_at":"2026-04-01T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93311","published_at":"2026-04-02T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93317","published_at":"2026-04-04T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93315","published_at":"2026-04-07T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93324","published_at":"2026-04-08T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93328","published_at":"2026-04-09T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93333","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93331","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93332","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.9335","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93355","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93362","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.9336","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93367","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.9338","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.9339","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93397","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10744","scoring_system":"epss","scoring_elements":"0.93411","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-3468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102323","reference_id":"1102323","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1102323"},{"reference_url":"https://security.gentoo.org/glsa/201408-09","reference_id":"GLSA-201408-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201408-09"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0594","reference_id":"RHSA-2014:0594","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0594"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0596","reference_id":"RHSA-2014:0596","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0596"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0687","reference_id":"RHSA-2014:0687","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0687"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0815","reference_id":"RHSA-2014:0815","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0815"},{"reference_url":"https://usn.ubuntu.com/2294-1/","reference_id":"USN-2294-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2294-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928772?format=json","purl":"pkg:deb/debian/libtasn1-6@3.6-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@3.6-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2014-3468"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qawp-nzw5-8ud5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/34496?format=json","vulnerability_id":"VCID-vra9-zq52-ryap","summary":"Multiple vulnerabilities have been found in libtasn1, the worst of\n    which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2806.json","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-2806.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2806","reference_id":"","reference_type":"","scores":[{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92738","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.9275","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92748","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92757","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92762","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92767","published_at":"2026-04-11T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92766","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92778","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92782","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92788","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92789","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92794","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92807","published_at":"2026-05-07T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92819","published_at":"2026-05-09T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92824","published_at":"2026-05-11T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.9283","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09345","scoring_system":"epss","scoring_elements":"0.92855","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2015-2806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207192","reference_id":"1207192","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1207192"},{"reference_url":"https://security.gentoo.org/glsa/201509-04","reference_id":"GLSA-201509-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201509-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2017:1860","reference_id":"RHSA-2017:1860","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2017:1860"},{"reference_url":"https://usn.ubuntu.com/2559-1/","reference_id":"USN-2559-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2559-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928776?format=json","purl":"pkg:deb/debian/libtasn1-6@4.2-3?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.2-3%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2015-2806"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vra9-zq52-ryap"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78904?format=json","vulnerability_id":"VCID-zw9h-2unc-1fg2","summary":"libtasn1: Out-of-bound access in ETYPE_OK","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46848.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-46848.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2021-46848","reference_id":"","reference_type":"","scores":[{"value":"0.00326","scoring_system":"epss","scoring_elements":"0.55434","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58773","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00369","scoring_system":"epss","scoring_elements":"0.58752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63091","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.6316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00439","scoring_system":"epss","scoring_elements":"0.63143","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.65983","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66013","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66032","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00501","scoring_system":"epss","scoring_elements":"0.66018","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.67191","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00528","scoring_system":"epss","scoring_elements":"0.6717","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70414","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70324","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70322","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70296","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70337","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70369","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00628","scoring_system":"epss","scoring_elements":"0.70364","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2021-46848"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140058","reference_id":"2140058","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2140058"},{"reference_url":"https://gitlab.com/gnutls/libtasn1/-/issues/32","reference_id":"32","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://gitlab.com/gnutls/libtasn1/-/issues/32"},{"reference_url":"https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5","reference_id":"44a700d2051a666235748970c2df047ff207aeb5","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5"},{"reference_url":"https://bugs.gentoo.org/866237","reference_id":"866237","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://bugs.gentoo.org/866237"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/","reference_id":"AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AV4SHDJF2XLB4CUPTBPQQ6CLGZ5LKXPZ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/","reference_id":"ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ECM2ELTVRYV4BZ5L5GMIRQE27RFHPAQ6/"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html","reference_id":"msg00003.html","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00003.html"},{"reference_url":"https://security.netapp.com/advisory/ntap-20221118-0006/","reference_id":"ntap-20221118-0006","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://security.netapp.com/advisory/ntap-20221118-0006/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/","reference_id":"OGO7XST4EIJGX4B2ITZCYSWM24534BSU","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OGO7XST4EIJGX4B2ITZCYSWM24534BSU/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0116","reference_id":"RHSA-2023:0116","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0116"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:0343","reference_id":"RHSA-2023:0343","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:0343"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:0427","reference_id":"RHSA-2024:0427","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:0427"},{"reference_url":"https://usn.ubuntu.com/5707-1/","reference_id":"USN-5707-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5707-1/"},{"reference_url":"https://usn.ubuntu.com/7954-1/","reference_id":"USN-7954-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7954-1/"},{"reference_url":"https://usn.ubuntu.com/7954-2/","reference_id":"USN-7954-2","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7954-2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/","reference_id":"V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2","reference_type":"","scores":[{"value":"9.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-07T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V5LWOGF7QRMNFRUCZY6TDYQJVFI6MOQ2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/928773?format=json","purl":"pkg:deb/debian/libtasn1-6@4.16.0-2%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.16.0-2%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928783?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928771?format=json","purl":"pkg:deb/debian/libtasn1-6@4.19.0-2%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.19.0-2%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928775?format=json","purl":"pkg:deb/debian/libtasn1-6@4.20.0-2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3gx3-2gs5-2yab"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.20.0-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/928774?format=json","purl":"pkg:deb/debian/libtasn1-6@4.21.0-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}],"aliases":["CVE-2021-46848"],"risk_score":4.1,"exploitability":"0.5","weighted_severity":"8.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zw9h-2unc-1fg2"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/libtasn1-6@4.21.0-2%3Fdistro=trixie"}