Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/123515?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/123515?format=api", "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.4-1jpp.1?arch=el5_10", "type": "rpm", "namespace": "redhat", "name": "java-1.5.0-ibm", "version": "1:1.5.0.16.4-1jpp.1", "qualifiers": { "arch": "el5_10" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56401?format=api", "vulnerability_id": "VCID-2gme-zs8y-bqec", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84698", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84699", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84727", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831", "reference_id": "1018831", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5840" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gme-zs8y-bqec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56398?format=api", "vulnerability_id": "VCID-2nc7-hgsm-9yd7", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89604", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89605", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89634", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89641", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89642", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89636", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139", "reference_id": "1019139", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5825" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nc7-hgsm-9yd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56386?format=api", "vulnerability_id": "VCID-6dhw-uqtb-kua5", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84698", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84699", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84727", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736", "reference_id": "1018736", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5790" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhw-uqtb-kua5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86514?format=api", "vulnerability_id": "VCID-7bdw-8b72-5fhr", "summary": "JDK: unspecified sandbox bypass (XML)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5375.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5375.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5375", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.82981", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.82997", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.8301", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83008", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.8304", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83049", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83045", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83084", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83083", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83109", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5375" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027768", "reference_id": "1027768", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027768" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5375" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bdw-8b72-5fhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56391?format=api", "vulnerability_id": "VCID-831v-7kmc-aucv", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.84017", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131", "reference_id": "1019131", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5804" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-831v-7kmc-aucv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56387?format=api", "vulnerability_id": "VCID-8faz-85u1-zbeq", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44896", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44856", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44908", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.4491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.4493", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.449", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44953", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44946", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44807", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720", "reference_id": "1018720", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5797" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8faz-85u1-zbeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56382?format=api", "vulnerability_id": "VCID-98s6-fdp7-gkg6", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84698", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84699", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84727", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785", "reference_id": "1018785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5780" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98s6-fdp7-gkg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56395?format=api", "vulnerability_id": "VCID-dzaq-rw8t-wqba", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91027", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91028", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91042", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117", "reference_id": "1019117", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5814" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzaq-rw8t-wqba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56396?format=api", "vulnerability_id": "VCID-e62p-4szd-3ubj", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91027", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91028", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91042", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118", "reference_id": "1019118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5817" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e62p-4szd-3ubj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56403?format=api", "vulnerability_id": "VCID-erxc-qxay-ayhr", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84698", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84699", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84727", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750", "reference_id": "1018750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5849" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-erxc-qxay-ayhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56394?format=api", "vulnerability_id": "VCID-f4d5-mkub-b3e1", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91934", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91942", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.9195", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91956", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91974", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91977", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91973", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91985", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.9199", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113", "reference_id": "1019113", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5809" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d5-mkub-b3e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61126?format=api", "vulnerability_id": "VCID-ha9m-r5c1-2ffd", "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n allowing attackers to cause unspecified impact.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5843.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5843.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5843", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89555", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89559", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89572", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89573", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89589", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89594", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89601", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89608", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89609", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.89605", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04897", "scoring_system": "epss", "scoring_elements": "0.8962", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5843" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019701", "reference_id": "1019701", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019701" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5843" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ha9m-r5c1-2ffd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56380?format=api", "vulnerability_id": "VCID-khuw-dsag-p7ey", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.84017", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147", "reference_id": "1019147", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5774" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khuw-dsag-p7ey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56378?format=api", "vulnerability_id": "VCID-kn39-nd68-a7c8", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83989", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83991", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.84017", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133", "reference_id": "1019133", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-3829" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kn39-nd68-a7c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56389?format=api", "vulnerability_id": "VCID-m2d2-shze-ybgs", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89082", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89091", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89105", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89142", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89138", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89136", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89149", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89146", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89163", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130", "reference_id": "1019130", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5802" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2d2-shze-ybgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56400?format=api", "vulnerability_id": "VCID-msup-sd1d-j3b8", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.9144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91467", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91477", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110", "reference_id": "1019110", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5830" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-msup-sd1d-j3b8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56399?format=api", "vulnerability_id": "VCID-n7ju-v5t7-h3eq", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.9144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91448", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91471", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91467", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91477", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115", "reference_id": "1019115", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5829" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ju-v5t7-h3eq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56383?format=api", "vulnerability_id": "VCID-pbdx-8nxr-nbew", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91003", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91027", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91026", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91028", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91042", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108", "reference_id": "1019108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5782" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbdx-8nxr-nbew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56381?format=api", "vulnerability_id": "VCID-q5c8-hwra-zyfr", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84698", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84699", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.847", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84727", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984", "reference_id": "1018984", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5778" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5c8-hwra-zyfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56390?format=api", "vulnerability_id": "VCID-qmvf-8y88-gqhh", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89604", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89605", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89634", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89641", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89642", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89636", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89652", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713", "reference_id": "1018713", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5803" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmvf-8y88-gqhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61117?format=api", "vulnerability_id": "VCID-r3jr-7dkg-5khb", "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n allowing attackers to cause unspecified impact.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5801.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5801.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5801", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84724", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84739", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84759", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84761", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84783", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.8479", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84808", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84804", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84799", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.8482", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84821", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84819", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.02321", "scoring_system": "epss", "scoring_elements": "0.84845", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5801" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019710", "reference_id": "1019710", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019710" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5801" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r3jr-7dkg-5khb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86513?format=api", "vulnerability_id": "VCID-twms-mj8q-pye1", "summary": "JDK: unspecified sandbox bypass (JVM)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4041.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4041.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4041", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.82981", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.82997", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.8301", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83008", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.8304", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83049", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83045", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83084", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83083", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83087", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0186", "scoring_system": "epss", "scoring_elements": "0.83109", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4041" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027764", "reference_id": "1027764", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027764" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4041" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-twms-mj8q-pye1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56384?format=api", "vulnerability_id": "VCID-uvbz-c5pd-a3hc", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85648", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85673", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85713", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85709", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85731", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85736", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.8573", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85754", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137", "reference_id": "1019137", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5783" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvbz-c5pd-a3hc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86515?format=api", "vulnerability_id": "VCID-yc3v-ejep-xydr", "summary": "JDK: XML4J xml entity expansion excessive memory use (XML)", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5372.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5372.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5372", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82368", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82382", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82399", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82396", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82424", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82431", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.8245", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82446", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82441", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82476", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82478", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82482", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01728", "scoring_system": "epss", "scoring_elements": "0.82504", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5372" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027825", "reference_id": "1027825", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027825" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5372" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yc3v-ejep-xydr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56402?format=api", "vulnerability_id": "VCID-z63k-wes3-gqgw", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95477", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95486", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95492", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95506", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95511", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95512", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95513", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95521", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95526", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95529", "published_at": "2026-04-24T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123", "reference_id": "1019123", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5842" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z63k-wes3-gqgw" } ], "fixing_vulnerabilities": [], "risk_score": "0.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.4-1jpp.1%3Farch=el5_10" }