{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42587?format=json","vulnerability_id":"VCID-st4p-dn2v-dbg3","summary":"Multiple vulnerabilities have been discovered in GnuPG and\n    Libgcrypt, which may result in execution of arbitrary code, Denial of\n    Service, or the disclosure of private keys.","aliases":[{"alias":"CVE-2012-6085"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/923702?format=json","purl":"pkg:deb/debian/gnupg2@2.0.19-2?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.0.19-2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/1035316?format=json","purl":"pkg:deb/debian/gnupg2@2.0.19-2%2Bdeb7u2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3jt3-2y11-yuc5"},{"vulnerability":"VCID-9cm4-mu3q-2yey"},{"vulnerability":"VCID-9jj4-5uem-kkbs"},{"vulnerability":"VCID-ba35-1hmw-m3hg"},{"vulnerability":"VCID-mhw6-1d6f-pbcp"},{"vulnerability":"VCID-nfzs-w4pe-bubj"},{"vulnerability":"VCID-ng6k-ru7r-9kdp"},{"vulnerability":"VCID-qapz-hmnm-x7dd"},{"vulnerability":"VCID-rqt5-xvxx-47h6"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.0.19-2%252Bdeb7u2"},{"url":"http://public2.vulnerablecode.io/api/packages/923691?format=json","purl":"pkg:deb/debian/gnupg2@2.2.27-2%2Bdeb11u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zx65-nc6s-8yf9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.2.27-2%252Bdeb11u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923689?format=json","purl":"pkg:deb/debian/gnupg2@2.2.40-1.1%2Bdeb12u2?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-zx65-nc6s-8yf9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.2.40-1.1%252Bdeb12u2%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923693?format=json","purl":"pkg:deb/debian/gnupg2@2.4.7-21%2Bdeb13u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-79fy-gfr6-zkgq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.4.7-21%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/923692?format=json","purl":"pkg:deb/debian/gnupg2@2.4.9-4?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-79fy-gfr6-zkgq"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.4.9-4%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/76087?format=json","purl":"pkg:ebuild/app-crypt/gnupg@2.0.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/app-crypt/gnupg@2.0.22"},{"url":"http://public2.vulnerablecode.io/api/packages/76088?format=json","purl":"pkg:ebuild/dev-libs/libgcrypt@1.5.3","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libgcrypt@1.5.3"},{"url":"http://public2.vulnerablecode.io/api/packages/76089?format=json","purl":"pkg:ebuild/dev-libs/libgcrypt@2.0.22","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-libs/libgcrypt@2.0.22"}],"affected_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/1035311?format=json","purl":"pkg:deb/debian/gnupg2@1.9.15-6sarge2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3jt3-2y11-yuc5"},{"vulnerability":"VCID-3vdu-cchd-ekcp"},{"vulnerability":"VCID-4jxu-65cg-gbag"},{"vulnerability":"VCID-9cm4-mu3q-2yey"},{"vulnerability":"VCID-9jj4-5uem-kkbs"},{"vulnerability":"VCID-ba35-1hmw-m3hg"},{"vulnerability":"VCID-c2pw-ysyx-q7an"},{"vulnerability":"VCID-e1yx-b7wn-83af"},{"vulnerability":"VCID-mhw6-1d6f-pbcp"},{"vulnerability":"VCID-n34c-87th-d7gz"},{"vulnerability":"VCID-nfzs-w4pe-bubj"},{"vulnerability":"VCID-ng6k-ru7r-9kdp"},{"vulnerability":"VCID-qapz-hmnm-x7dd"},{"vulnerability":"VCID-rqt5-xvxx-47h6"},{"vulnerability":"VCID-st4p-dn2v-dbg3"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-xgfe-d1s6-eufu"},{"vulnerability":"VCID-y6zm-whbe-gfg4"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@1.9.15-6sarge2"},{"url":"http://public2.vulnerablecode.io/api/packages/1035312?format=json","purl":"pkg:deb/debian/gnupg2@2.0.0-5.2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3jt3-2y11-yuc5"},{"vulnerability":"VCID-3vdu-cchd-ekcp"},{"vulnerability":"VCID-9cm4-mu3q-2yey"},{"vulnerability":"VCID-9jj4-5uem-kkbs"},{"vulnerability":"VCID-ba35-1hmw-m3hg"},{"vulnerability":"VCID-e1yx-b7wn-83af"},{"vulnerability":"VCID-mhw6-1d6f-pbcp"},{"vulnerability":"VCID-n34c-87th-d7gz"},{"vulnerability":"VCID-nfzs-w4pe-bubj"},{"vulnerability":"VCID-ng6k-ru7r-9kdp"},{"vulnerability":"VCID-qapz-hmnm-x7dd"},{"vulnerability":"VCID-rqt5-xvxx-47h6"},{"vulnerability":"VCID-st4p-dn2v-dbg3"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.0.0-5.2"},{"url":"http://public2.vulnerablecode.io/api/packages/1035313?format=json","purl":"pkg:deb/debian/gnupg2@2.0.9-3.1%2Blenny1","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3jt3-2y11-yuc5"},{"vulnerability":"VCID-9cm4-mu3q-2yey"},{"vulnerability":"VCID-9jj4-5uem-kkbs"},{"vulnerability":"VCID-ba35-1hmw-m3hg"},{"vulnerability":"VCID-mhw6-1d6f-pbcp"},{"vulnerability":"VCID-n34c-87th-d7gz"},{"vulnerability":"VCID-nfzs-w4pe-bubj"},{"vulnerability":"VCID-ng6k-ru7r-9kdp"},{"vulnerability":"VCID-qapz-hmnm-x7dd"},{"vulnerability":"VCID-rqt5-xvxx-47h6"},{"vulnerability":"VCID-st4p-dn2v-dbg3"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.0.9-3.1%252Blenny1"},{"url":"http://public2.vulnerablecode.io/api/packages/1035314?format=json","purl":"pkg:deb/debian/gnupg2@2.0.14-2%2Bsqueeze2","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3jt3-2y11-yuc5"},{"vulnerability":"VCID-9cm4-mu3q-2yey"},{"vulnerability":"VCID-9jj4-5uem-kkbs"},{"vulnerability":"VCID-ba35-1hmw-m3hg"},{"vulnerability":"VCID-mhw6-1d6f-pbcp"},{"vulnerability":"VCID-nfzs-w4pe-bubj"},{"vulnerability":"VCID-ng6k-ru7r-9kdp"},{"vulnerability":"VCID-qapz-hmnm-x7dd"},{"vulnerability":"VCID-rqt5-xvxx-47h6"},{"vulnerability":"VCID-st4p-dn2v-dbg3"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.0.14-2%252Bsqueeze2"},{"url":"http://public2.vulnerablecode.io/api/packages/1035315?format=json","purl":"pkg:deb/debian/gnupg2@2.0.14-2%2Bsqueeze3","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-3jt3-2y11-yuc5"},{"vulnerability":"VCID-9cm4-mu3q-2yey"},{"vulnerability":"VCID-9jj4-5uem-kkbs"},{"vulnerability":"VCID-ba35-1hmw-m3hg"},{"vulnerability":"VCID-mhw6-1d6f-pbcp"},{"vulnerability":"VCID-nfzs-w4pe-bubj"},{"vulnerability":"VCID-ng6k-ru7r-9kdp"},{"vulnerability":"VCID-qapz-hmnm-x7dd"},{"vulnerability":"VCID-rqt5-xvxx-47h6"},{"vulnerability":"VCID-st4p-dn2v-dbg3"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/gnupg2@2.0.14-2%252Bsqueeze3"},{"url":"http://public2.vulnerablecode.io/api/packages/123823?format=json","purl":"pkg:rpm/redhat/gnupg@1.4.5-18?arch=el5_10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-st4p-dn2v-dbg3"},{"vulnerability":"VCID-uf47-ymx9-kycg"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gnupg@1.4.5-18%3Farch=el5_10"},{"url":"http://public2.vulnerablecode.io/api/packages/123821?format=json","purl":"pkg:rpm/redhat/gnupg2@2.0.10-6?arch=el5_10","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-st4p-dn2v-dbg3"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gnupg2@2.0.10-6%3Farch=el5_10"},{"url":"http://public2.vulnerablecode.io/api/packages/123822?format=json","purl":"pkg:rpm/redhat/gnupg2@2.0.14-6?arch=el6_4","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-st4p-dn2v-dbg3"},{"vulnerability":"VCID-vmyv-5rvk-akh3"},{"vulnerability":"VCID-zytz-gsnc-yqh9"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/gnupg2@2.0.14-6%3Farch=el6_4"}],"references":[{"reference_url":"http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commitdiff%3Bh=f0b33b6fb8e0586e9584a7a409dcc31263776a67","reference_id":"","reference_type":"","scores":[],"url":"http://git.gnupg.org/cgi-bin/gitweb.cgi?p=gnupg.git%3Ba=commitdiff%3Bh=f0b33b6fb8e0586e9584a7a409dcc31263776a67"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095513.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095513.html"},{"reference_url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095516.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.fedoraproject.org/pipermail/package-announce/2013-January/095516.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1459.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1459.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6085.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-6085.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6085","reference_id":"","reference_type":"","scores":[{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84925","published_at":"2026-05-16T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84679","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84714","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84716","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84738","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84745","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84763","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84759","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84753","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84775","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84774","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.848","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.8481","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84809","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84826","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84851","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84869","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84864","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84879","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84912","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02306","scoring_system":"epss","scoring_elements":"0.84922","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-6085"},{"reference_url":"https://bugs.g10code.com/gnupg/issue1455","reference_id":"","reference_type":"","scores":[],"url":"https://bugs.g10code.com/gnupg/issue1455"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80990","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/80990"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:001","reference_id":"","reference_type":"","scores":[],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2013:001"},{"reference_url":"http://www.openwall.com/lists/oss-security/2013/01/01/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2013/01/01/6"},{"reference_url":"http://www.securityfocus.com/bid/57102","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/57102"},{"reference_url":"http://www.ubuntu.com/usn/USN-1682-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1682-1"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697251","reference_id":"697251","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=697251"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=891142","reference_id":"891142","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=891142"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.11:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.12:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.13:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.14:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.15:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.16:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.17:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.18:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.19:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6085","reference_id":"CVE-2012-6085","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:P/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-6085"},{"reference_url":"https://security.gentoo.org/glsa/201402-24","reference_id":"GLSA-201402-24","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201402-24"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1458","reference_id":"RHSA-2013:1458","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1458"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1459","reference_id":"RHSA-2013:1459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1459"},{"reference_url":"https://usn.ubuntu.com/1682-1/","reference_id":"USN-1682-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1682-1/"}],"weaknesses":[{"cwe_id":20,"name":"Improper Input Validation","description":"The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly."}],"exploits":[],"severity_range_score":"5.8 - 5.8","exploitability":"0.5","weighted_severity":"5.2","risk_score":2.6,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-st4p-dn2v-dbg3"}