Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/120357?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/120357?format=api", "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.10-1jpp.4?arch=el5", "type": "rpm", "namespace": "redhat", "name": "java-1.7.0-ibm", "version": "1:1.7.0.8.10-1jpp.4", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31271?format=api", "vulnerability_id": "VCID-753c-x7gd-37dd", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6593.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98656", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98657", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.9866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98663", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98664", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98669", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98672", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183049", "reference_id": "1183049", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183049" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/38641.rb", "reference_id": "CVE-2014-6593;OSVDB-117238", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/38641.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-6593" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-753c-x7gd-37dd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40104?format=api", "vulnerability_id": "VCID-98te-nhbx-qbb9", "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n allowing both local and remote attackers to compromise various Java\n components.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6549.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76868", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76875", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76905", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76887", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76929", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76957", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76932", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76974", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6549" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183660", "reference_id": "1183660", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183660" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" } ], "fixed_packages": [], "aliases": [ "CVE-2014-6549" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98te-nhbx-qbb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31278?format=api", "vulnerability_id": "VCID-ccht-tkj5-jfez", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0408.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0408.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91853", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91868", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91892", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91911", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183023", "reference_id": "1183023", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183023" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0408" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ccht-tkj5-jfez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31268?format=api", "vulnerability_id": "VCID-dr2n-9pz1-gfd5", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6585.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85492", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.8557", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85586", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183645", "reference_id": "1183645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183645" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776264", "reference_id": "776264", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776264" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-3/", "reference_id": "USN-2522-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-6585" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dr2n-9pz1-gfd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31277?format=api", "vulnerability_id": "VCID-edhe-xduh-8fb9", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0407.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0407.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86255", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86282", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86301", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86311", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86325", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86323", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86319", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86334", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183043", "reference_id": "1183043", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183043" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0407" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edhe-xduh-8fb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40158?format=api", "vulnerability_id": "VCID-f46c-z1vt-jkae", "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n allowing both local and remote attackers to compromise various Java\n components.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0410.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0410.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90143", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90146", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90157", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90192", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90186", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90204", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183044", "reference_id": "1183044", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183044" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0410" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f46c-z1vt-jkae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85852?format=api", "vulnerability_id": "VCID-jqmy-2cq5-v7gf", "summary": "JDK: unspecified partial Java sandbox bypass fixed in Feb 2015 update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8892.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8892.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8892", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81546", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81557", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81579", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81604", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.8161", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.8163", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81617", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01587", "scoring_system": "epss", "scoring_elements": "0.81647", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189145", "reference_id": "1189145", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" } ], "fixed_packages": [], "aliases": [ "CVE-2014-8892" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jqmy-2cq5-v7gf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40146?format=api", "vulnerability_id": "VCID-ntmk-ub1c-5ygz", "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n allowing both local and remote attackers to compromise various Java\n components.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0403.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0403.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0403", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32309", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3246", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32496", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32319", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32367", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32395", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32397", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.3236", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32333", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00129", "scoring_system": "epss", "scoring_elements": "0.32369", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0403" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184275", "reference_id": "1184275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184275" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0403" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ntmk-ub1c-5ygz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31270?format=api", "vulnerability_id": "VCID-nyhx-9tes-9ygr", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6591.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84697", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84733", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84762", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.8478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84775", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.8477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84791", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183646", "reference_id": "1183646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183646" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884", "reference_id": "775884", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-3/", "reference_id": "USN-2522-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-3/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-6591" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nyhx-9tes-9ygr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85851?format=api", "vulnerability_id": "VCID-v8dj-c1hh-wbe8", "summary": "JDK: unspecified full Java sandbox bypass fixed in Feb 2015 update", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8891.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-8891.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8891", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.91129", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.91135", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.91143", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.91151", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.91164", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.9117", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.91178", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.9118", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.91179", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06611", "scoring_system": "epss", "scoring_elements": "0.91204", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-8891" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189142", "reference_id": "1189142", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1189142" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" } ], "fixed_packages": [], "aliases": [ "CVE-2014-8891" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v8dj-c1hh-wbe8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31269?format=api", "vulnerability_id": "VCID-vuvu-hscm-guh1", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6587.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6587.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34085", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34449", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34387", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.3439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.3435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34327", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34362", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183715", "reference_id": "1183715", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183715" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2014-6587" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vuvu-hscm-guh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31279?format=api", "vulnerability_id": "VCID-xgvx-tpbg-73hf", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0412.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80695", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80704", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80725", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80722", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.8075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80759", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80775", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.8076", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80751", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80788", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183021", "reference_id": "1183021", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183021" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0412" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xgvx-tpbg-73hf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40147?format=api", "vulnerability_id": "VCID-xry5-hzk4-b3b8", "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n allowing both local and remote attackers to compromise various Java\n components.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0406.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0406.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0406", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90502", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90506", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90523", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90541", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.9055", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90549", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90543", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05843", "scoring_system": "epss", "scoring_elements": "0.90561", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0406" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184277", "reference_id": "1184277", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184277" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" } ], "fixed_packages": [], "aliases": [ "CVE-2015-0406" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xry5-hzk4-b3b8" } ], "fixing_vulnerabilities": [], "risk_score": "1.2", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.10-1jpp.4%3Farch=el5" }