Lookup for vulnerable packages by Package URL.

GET /api/packages/123515?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/123515?format=api",
    "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.4-1jpp.1?arch=el5_10",
    "type": "rpm",
    "namespace": "redhat",
    "name": "java-1.5.0-ibm",
    "version": "1:1.5.0.16.4-1jpp.1",
    "qualifiers": {
        "arch": "el5_10"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56401?format=api",
            "vulnerability_id": "VCID-2gme-zs8y-bqec",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84727",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831",
                    "reference_id": "1018831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5840"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gme-zs8y-bqec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56398?format=api",
            "vulnerability_id": "VCID-2nc7-hgsm-9yd7",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89604",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89641",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89642",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89636",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89652",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139",
                    "reference_id": "1019139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5825"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nc7-hgsm-9yd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56386?format=api",
            "vulnerability_id": "VCID-6dhw-uqtb-kua5",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84727",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736",
                    "reference_id": "1018736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5790"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhw-uqtb-kua5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86514?format=api",
            "vulnerability_id": "VCID-7bdw-8b72-5fhr",
            "summary": "JDK: unspecified sandbox bypass (XML)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5375.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5375.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5375",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82981",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82997",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8301",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83008",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83033",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8304",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83056",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83049",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83045",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83084",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83083",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83087",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83109",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5375"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027768",
                    "reference_id": "1027768",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027768"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5375"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7bdw-8b72-5fhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56391?format=api",
            "vulnerability_id": "VCID-831v-7kmc-aucv",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84017",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131",
                    "reference_id": "1019131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5804"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-831v-7kmc-aucv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56387?format=api",
            "vulnerability_id": "VCID-8faz-85u1-zbeq",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44896",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44915",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44908",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4493",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.449",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44953",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44946",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44807",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720",
                    "reference_id": "1018720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5797"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8faz-85u1-zbeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56382?format=api",
            "vulnerability_id": "VCID-98s6-fdp7-gkg6",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84727",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785",
                    "reference_id": "1018785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5780"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98s6-fdp7-gkg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56395?format=api",
            "vulnerability_id": "VCID-dzaq-rw8t-wqba",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91027",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91026",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91042",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117",
                    "reference_id": "1019117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5814"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzaq-rw8t-wqba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56396?format=api",
            "vulnerability_id": "VCID-e62p-4szd-3ubj",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91027",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91026",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91042",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118",
                    "reference_id": "1019118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5817"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e62p-4szd-3ubj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56403?format=api",
            "vulnerability_id": "VCID-erxc-qxay-ayhr",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84727",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750",
                    "reference_id": "1018750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5849"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-erxc-qxay-ayhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56394?format=api",
            "vulnerability_id": "VCID-f4d5-mkub-b3e1",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91934",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91942",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9195",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91956",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91974",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91977",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91973",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91992",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91985",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9199",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113",
                    "reference_id": "1019113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5809"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d5-mkub-b3e1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61126?format=api",
            "vulnerability_id": "VCID-ha9m-r5c1-2ffd",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5843.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5843.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89555",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89559",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89572",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89573",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89589",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89601",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.896",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89608",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89609",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8962",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5843"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019701",
                    "reference_id": "1019701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019701"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5843"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ha9m-r5c1-2ffd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56380?format=api",
            "vulnerability_id": "VCID-khuw-dsag-p7ey",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84017",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147",
                    "reference_id": "1019147",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5774"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khuw-dsag-p7ey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56378?format=api",
            "vulnerability_id": "VCID-kn39-nd68-a7c8",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84017",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133",
                    "reference_id": "1019133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-3829"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kn39-nd68-a7c8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56389?format=api",
            "vulnerability_id": "VCID-m2d2-shze-ybgs",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89082",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89091",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89105",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89126",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89131",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89142",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89138",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89136",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89149",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89146",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89163",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130",
                    "reference_id": "1019130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5802"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2d2-shze-ybgs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56400?format=api",
            "vulnerability_id": "VCID-msup-sd1d-j3b8",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91421",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91446",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91448",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91467",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91477",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110",
                    "reference_id": "1019110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5830"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-msup-sd1d-j3b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56399?format=api",
            "vulnerability_id": "VCID-n7ju-v5t7-h3eq",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91421",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91446",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91448",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91467",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91477",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115",
                    "reference_id": "1019115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5829"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ju-v5t7-h3eq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56383?format=api",
            "vulnerability_id": "VCID-pbdx-8nxr-nbew",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91027",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91026",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91042",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108",
                    "reference_id": "1019108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5782"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbdx-8nxr-nbew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56381?format=api",
            "vulnerability_id": "VCID-q5c8-hwra-zyfr",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84727",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984",
                    "reference_id": "1018984",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5778"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5c8-hwra-zyfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56390?format=api",
            "vulnerability_id": "VCID-qmvf-8y88-gqhh",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89604",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89641",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89642",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89636",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89652",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713",
                    "reference_id": "1018713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5803"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmvf-8y88-gqhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61117?format=api",
            "vulnerability_id": "VCID-r3jr-7dkg-5khb",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5801.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5801.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84724",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84759",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84761",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84783",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8479",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84808",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84804",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84799",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8482",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84821",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84819",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84845",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5801"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019710",
                    "reference_id": "1019710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019710"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5801"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r3jr-7dkg-5khb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86513?format=api",
            "vulnerability_id": "VCID-twms-mj8q-pye1",
            "summary": "JDK: unspecified sandbox bypass (JVM)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4041.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4041.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4041",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82981",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82997",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8301",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83008",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83033",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8304",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83056",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83049",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83045",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83084",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83083",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83087",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0186",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83109",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4041"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027764",
                    "reference_id": "1027764",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027764"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-4041"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-twms-mj8q-pye1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56384?format=api",
            "vulnerability_id": "VCID-uvbz-c5pd-a3hc",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85636",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85673",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85692",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85717",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85713",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85709",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85731",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85736",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8573",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85754",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137",
                    "reference_id": "1019137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5783"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvbz-c5pd-a3hc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86515?format=api",
            "vulnerability_id": "VCID-yc3v-ejep-xydr",
            "summary": "JDK: XML4J xml entity expansion excessive memory use (XML)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5372.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5372.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5372",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82368",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82382",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82399",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82396",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82424",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82431",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8245",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82446",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82441",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82476",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82478",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82482",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01728",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82504",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5372"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027825",
                    "reference_id": "1027825",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1027825"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5372"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yc3v-ejep-xydr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56402?format=api",
            "vulnerability_id": "VCID-z63k-wes3-gqgw",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95477",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95486",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95492",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95497",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95506",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95511",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95512",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95521",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95526",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95529",
                            "published_at": "2026-04-24T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123",
                    "reference_id": "1019123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5842"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z63k-wes3-gqgw"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "0.1",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.4-1jpp.1%3Farch=el5_10"
}