Lookup for vulnerable packages by Package URL.

GET /api/packages/123545?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/123545?format=api",
    "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.45-2.4.3.1?arch=el5_10",
    "type": "rpm",
    "namespace": "redhat",
    "name": "java-1.7.0-openjdk",
    "version": "1:1.7.0.45-2.4.3.1",
    "qualifiers": {
        "arch": "el5_10"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56379?format=api",
            "vulnerability_id": "VCID-17nn-wrs1-fkb6",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5772.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5772.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5772"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018717",
                    "reference_id": "1018717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018717"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5772"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-17nn-wrs1-fkb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56401?format=api",
            "vulnerability_id": "VCID-2gme-zs8y-bqec",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831",
                    "reference_id": "1018831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5840"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gme-zs8y-bqec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56397?format=api",
            "vulnerability_id": "VCID-2jj1-ebr5-5bbj",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5820.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5820.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5820",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5820"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018972",
                    "reference_id": "1018972",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018972"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5820"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jj1-ebr5-5bbj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56398?format=api",
            "vulnerability_id": "VCID-2nc7-hgsm-9yd7",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89604",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139",
                    "reference_id": "1019139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5825"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nc7-hgsm-9yd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56386?format=api",
            "vulnerability_id": "VCID-6dhw-uqtb-kua5",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736",
                    "reference_id": "1018736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5790"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhw-uqtb-kua5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4981?format=api",
            "vulnerability_id": "VCID-6q4h-4h6p-nufq",
            "summary": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.",
            "references": [
                {
                    "reference_url": "http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/a7758faab30d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/a7758faab30d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0414"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5823.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5823.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89604",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89634",
                            "published_at": "2026-04-11T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5823"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/55a48497dfbf3fe63a81e67c13160b3f41ebb1f3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/55a48497dfbf3fe63a81e67c13160b3f41ebb1f3"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/f9a61f2df9473237aa71308c28113540b4063d33",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/f9a61f2df9473237aa71308c28113540b4063d33"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/SANTUARIO-334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://issues.apache.org/jira/browse/SANTUARIO-334"
                },
                {
                    "reference_url": "https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
                },
                {
                    "reference_url": "https://marc.info/?l=bugtraq&m=138674031212883&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://marc.info/?l=bugtraq&m=138674031212883&w=2"
                },
                {
                    "reference_url": "https://marc.info/?l=bugtraq&m=138674073720143&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://marc.info/?l=bugtraq&m=138674073720143&w=2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5823"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/glsa-201406-32.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/glsa-201406-32.xml"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=1367492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://svn.apache.org/viewvc?view=revision&revision=1367492"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019145",
                    "reference_id": "1019145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019145"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/CVE-2013-5823",
                    "reference_id": "CVE-2013-5823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/CVE-2013-5823"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8gwc-x7mg-7p7p",
                    "reference_id": "GHSA-8gwc-x7mg-7p7p",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8gwc-x7mg-7p7p"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5823",
                "GHSA-8gwc-x7mg-7p7p"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6q4h-4h6p-nufq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56391?format=api",
            "vulnerability_id": "VCID-831v-7kmc-aucv",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131",
                    "reference_id": "1019131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5804"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-831v-7kmc-aucv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56387?format=api",
            "vulnerability_id": "VCID-8faz-85u1-zbeq",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44896",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44915",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44908",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4493",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.449",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720",
                    "reference_id": "1018720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5797"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8faz-85u1-zbeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56382?format=api",
            "vulnerability_id": "VCID-98s6-fdp7-gkg6",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785",
                    "reference_id": "1018785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5780"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98s6-fdp7-gkg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4827?format=api",
            "vulnerability_id": "VCID-a6wc-3mp6-63ek",
            "summary": "XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1818.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1818.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1821.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1821.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1822.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1822.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1823.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1823.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0414"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90313",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90269",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90272",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90286",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9029",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90312",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9032",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90319",
                            "published_at": "2026-04-12T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4002"
                },
                {
                    "reference_url": "http://secunia.com/advisories/56257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/56257"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201406-32.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260"
                },
                {
                    "reference_url": "https://github.com/apache/xerces2-j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/xerces2-j"
                },
                {
                    "reference_url": "https://github.com/apache/xerces2-j/commit/266e837852e0f0e3c8c1ad572b6fc4dbb4ded17",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/xerces2-j/commit/266e837852e0f0e3c8c1ad572b6fc4dbb4ded17"
                },
                {
                    "reference_url": "https://github.com/apache/xerces2-j/commit/628cbc7142ef9acfb61b8e571aab63504235849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/xerces2-j/commit/628cbc7142ef9acfb61b8e571aab63504235849"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/XERCESJ-1679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://issues.apache.org/jira/browse/XERCESJ-1679"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4002"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT5982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://support.apple.com/kb/HT5982"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=1499506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://svn.apache.org/viewvc?view=revision&revision=1499506"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21653371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21653371"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21657539"
                },
                {
                    "reference_url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
                },
                {
                    "reference_url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002"
                },
                {
                    "reference_url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=swg21648172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ibm.com/support/docview.wss?uid=swg21648172"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/61310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/61310"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2033-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2033-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2089-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2089-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019176",
                    "reference_id": "1019176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019176"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*",
                    "reference_id": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/CVE-2013-4002",
                    "reference_id": "CVE-2013-4002",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/CVE-2013-4002"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7j4h-8wpf-rqfh",
                    "reference_id": "GHSA-7j4h-8wpf-rqfh",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7j4h-8wpf-rqfh"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1059",
                    "reference_id": "RHSA-2013:1059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1060",
                    "reference_id": "RHSA-2013:1060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1060"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1081",
                    "reference_id": "RHSA-2013:1081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1081"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1319",
                    "reference_id": "RHSA-2014:1319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1319"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1818",
                    "reference_id": "RHSA-2014:1818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1821",
                    "reference_id": "RHSA-2014:1821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1822",
                    "reference_id": "RHSA-2014:1822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1823",
                    "reference_id": "RHSA-2014:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0234",
                    "reference_id": "RHSA-2015:0234",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0234"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0235",
                    "reference_id": "RHSA-2015:0235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0235"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0269",
                    "reference_id": "RHSA-2015:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0675",
                    "reference_id": "RHSA-2015:0675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0720",
                    "reference_id": "RHSA-2015:0720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0765",
                    "reference_id": "RHSA-2015:0765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0765"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0773",
                    "reference_id": "RHSA-2015:0773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0773"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-4002",
                "GHSA-7j4h-8wpf-rqfh"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6wc-3mp6-63ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61125?format=api",
            "vulnerability_id": "VCID-aqtv-nbes-33aw",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5838.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5838.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87485",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87495",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87509",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87511",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8753",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87537",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87548",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8754",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5838"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019300",
                    "reference_id": "1019300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019300"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5838"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aqtv-nbes-33aw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56404?format=api",
            "vulnerability_id": "VCID-bkcn-7xu6-g7at",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5850.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5850.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9119",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91195",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91203",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91224",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9123",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91237",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9124",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5850"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019127",
                    "reference_id": "1019127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019127"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5850"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcn-7xu6-g7at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56395?format=api",
            "vulnerability_id": "VCID-dzaq-rw8t-wqba",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117",
                    "reference_id": "1019117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5814"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzaq-rw8t-wqba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56396?format=api",
            "vulnerability_id": "VCID-e62p-4szd-3ubj",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118",
                    "reference_id": "1019118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5817"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e62p-4szd-3ubj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56403?format=api",
            "vulnerability_id": "VCID-erxc-qxay-ayhr",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750",
                    "reference_id": "1018750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5849"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-erxc-qxay-ayhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56394?format=api",
            "vulnerability_id": "VCID-f4d5-mkub-b3e1",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91934",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91942",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9195",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91956",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91974",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91977",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91973",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113",
                    "reference_id": "1019113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5809"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d5-mkub-b3e1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56380?format=api",
            "vulnerability_id": "VCID-khuw-dsag-p7ey",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147",
                    "reference_id": "1019147",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5774"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khuw-dsag-p7ey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56378?format=api",
            "vulnerability_id": "VCID-kn39-nd68-a7c8",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133",
                    "reference_id": "1019133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-3829"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kn39-nd68-a7c8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56389?format=api",
            "vulnerability_id": "VCID-m2d2-shze-ybgs",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89082",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89091",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89105",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89126",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89131",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89142",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89138",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89136",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130",
                    "reference_id": "1019130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5802"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2d2-shze-ybgs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56400?format=api",
            "vulnerability_id": "VCID-msup-sd1d-j3b8",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91421",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91446",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91448",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110",
                    "reference_id": "1019110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5830"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-msup-sd1d-j3b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56405?format=api",
            "vulnerability_id": "VCID-n6gc-cnsc-z7a6",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5851.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5851.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5851",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84836",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84852",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8487",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84872",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84895",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84902",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8492",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84919",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84913",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5851"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018977",
                    "reference_id": "1018977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018977"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5851"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n6gc-cnsc-z7a6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56399?format=api",
            "vulnerability_id": "VCID-n7ju-v5t7-h3eq",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91421",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91446",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91448",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115",
                    "reference_id": "1019115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5829"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ju-v5t7-h3eq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56383?format=api",
            "vulnerability_id": "VCID-pbdx-8nxr-nbew",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108",
                    "reference_id": "1019108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5782"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbdx-8nxr-nbew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56381?format=api",
            "vulnerability_id": "VCID-q5c8-hwra-zyfr",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984",
                    "reference_id": "1018984",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5778"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5c8-hwra-zyfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56390?format=api",
            "vulnerability_id": "VCID-qmvf-8y88-gqhh",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89604",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713",
                    "reference_id": "1018713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5803"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmvf-8y88-gqhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56385?format=api",
            "vulnerability_id": "VCID-sk3j-q3uf-5yfp",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5784.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5784.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5784"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018727",
                    "reference_id": "1018727",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018727"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5784"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sk3j-q3uf-5yfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56384?format=api",
            "vulnerability_id": "VCID-uvbz-c5pd-a3hc",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85636",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85673",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85692",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85717",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85713",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85709",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137",
                    "reference_id": "1019137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5783"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvbz-c5pd-a3hc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56388?format=api",
            "vulnerability_id": "VCID-x72p-yry2-bugs",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5800.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5800.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84446",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84461",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8448",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84482",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84509",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84528",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84523",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84519",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5800"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018755",
                    "reference_id": "1018755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018755"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5800"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x72p-yry2-bugs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56402?format=api",
            "vulnerability_id": "VCID-z63k-wes3-gqgw",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95477",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95486",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95492",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95497",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95506",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95511",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95512",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95513",
                            "published_at": "2026-04-13T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123",
                    "reference_id": "1019123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5842"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z63k-wes3-gqgw"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.45-2.4.3.1%3Farch=el5_10"
}