Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/123545?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/123545?format=api", "purl": "pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.45-2.4.3.1?arch=el5_10", "type": "rpm", "namespace": "redhat", "name": "java-1.7.0-openjdk", "version": "1:1.7.0.45-2.4.3.1", "qualifiers": { "arch": "el5_10" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56379?format=api", "vulnerability_id": "VCID-17nn-wrs1-fkb6", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5772.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5772.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5772", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5772" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018717", "reference_id": "1018717", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018717" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5772" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-17nn-wrs1-fkb6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56401?format=api", "vulnerability_id": "VCID-2gme-zs8y-bqec", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831", "reference_id": "1018831", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5840" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gme-zs8y-bqec" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56397?format=api", "vulnerability_id": "VCID-2jj1-ebr5-5bbj", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5820.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5820.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5820", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5820" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018972", "reference_id": "1018972", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018972" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5820" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jj1-ebr5-5bbj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56398?format=api", "vulnerability_id": "VCID-2nc7-hgsm-9yd7", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89604", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89605", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89634", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139", "reference_id": "1019139", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5825" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nc7-hgsm-9yd7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56386?format=api", "vulnerability_id": "VCID-6dhw-uqtb-kua5", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736", "reference_id": "1018736", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5790" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhw-uqtb-kua5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4981?format=api", "vulnerability_id": "VCID-6q4h-4h6p-nufq", "summary": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.", "references": [ { "reference_url": "http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/a7758faab30d", "reference_id": "", "reference_type": "", "scores": [], "url": "http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/a7758faab30d" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0414", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2014:0414" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5823.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5823.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5823", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89604", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89605", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89634", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5823" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823" }, { "reference_url": "https://github.com/apache/santuario-java/commit/55a48497dfbf3fe63a81e67c13160b3f41ebb1f3", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/santuario-java/commit/55a48497dfbf3fe63a81e67c13160b3f41ebb1f3" }, { "reference_url": "https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710" }, { "reference_url": "https://github.com/apache/santuario-java/commit/f9a61f2df9473237aa71308c28113540b4063d33", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/santuario-java/commit/f9a61f2df9473237aa71308c28113540b4063d33" }, { "reference_url": "https://issues.apache.org/jira/browse/SANTUARIO-334", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/SANTUARIO-334" }, { "reference_url": "https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" }, { "reference_url": "https://marc.info/?l=bugtraq&m=138674031212883&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://marc.info/?l=bugtraq&m=138674031212883&w=2" }, { "reference_url": "https://marc.info/?l=bugtraq&m=138674073720143&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://marc.info/?l=bugtraq&m=138674073720143&w=2" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5823", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5823" }, { "reference_url": "https://security.gentoo.org/glsa/glsa-201406-32.xml", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=1367492", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.apache.org/viewvc?view=revision&revision=1367492" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019145", "reference_id": "1019145", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019145" }, { "reference_url": "https://bugzilla.redhat.com/CVE-2013-5823", "reference_id": "CVE-2013-5823", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/CVE-2013-5823" }, { "reference_url": "https://github.com/advisories/GHSA-8gwc-x7mg-7p7p", "reference_id": "GHSA-8gwc-x7mg-7p7p", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-8gwc-x7mg-7p7p" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5823", "GHSA-8gwc-x7mg-7p7p" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6q4h-4h6p-nufq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56391?format=api", "vulnerability_id": "VCID-831v-7kmc-aucv", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131", "reference_id": "1019131", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5804" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-831v-7kmc-aucv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56387?format=api", "vulnerability_id": "VCID-8faz-85u1-zbeq", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44815", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44896", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44915", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44856", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44908", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.4491", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.4493", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44899", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.449", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720", "reference_id": "1018720", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5797" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8faz-85u1-zbeq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56382?format=api", "vulnerability_id": "VCID-98s6-fdp7-gkg6", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785", "reference_id": "1018785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5780" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98s6-fdp7-gkg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4827?format=api", "vulnerability_id": "VCID-a6wc-3mp6-63ek", "summary": "XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.", "references": [ { "reference_url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1818.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1818.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1821.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1821.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1822.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1822.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1823.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1823.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0414", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2014:0414" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4002.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4002.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4002", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.90313", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.90269", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.90272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.90286", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.9029", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.90305", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.90312", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.9032", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05597", "scoring_system": "epss", "scoring_elements": "0.90319", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4002" }, { "reference_url": "http://secunia.com/advisories/56257", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/56257" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260" }, { "reference_url": "https://github.com/apache/xerces2-j", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/xerces2-j" }, { "reference_url": "https://github.com/apache/xerces2-j/commit/266e837852e0f0e3c8c1ad572b6fc4dbb4ded17", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/apache/xerces2-j/commit/266e837852e0f0e3c8c1ad572b6fc4dbb4ded17" }, { "reference_url": "https://github.com/apache/xerces2-j/commit/628cbc7142ef9acfb61b8e571aab63504235849", "reference_id": "", "reference_type": "", "scores": [], "url": "https://github.com/apache/xerces2-j/commit/628cbc7142ef9acfb61b8e571aab63504235849" }, { "reference_url": "https://issues.apache.org/jira/browse/XERCESJ-1679", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.apache.org/jira/browse/XERCESJ-1679" }, { "reference_url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E" }, { "reference_url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E", "reference_id": "", "reference_type": "", "scores": [], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4002", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C" }, { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4002" }, { "reference_url": "http://support.apple.com/kb/HT5982", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://support.apple.com/kb/HT5982" }, { "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=1499506", "reference_id": "", "reference_type": "", "scores": [], "url": "http://svn.apache.org/viewvc?view=revision&revision=1499506" }, { "reference_url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21653371", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21653371" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21657539", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21657539" }, { "reference_url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html" }, { "reference_url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002" }, { "reference_url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013" }, { "reference_url": "http://www.ibm.com/support/docview.wss?uid=swg21648172", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21648172" }, { "reference_url": "http://www.securityfocus.com/bid/61310", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/61310" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2033-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ubuntu.com/usn/USN-2033-1" }, { "reference_url": "http://www.ubuntu.com/usn/USN-2089-1", "reference_id": "", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.ubuntu.com/usn/USN-2089-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019176", "reference_id": "1019176", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019176" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*", "reference_id": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*" }, { "reference_url": "https://bugzilla.redhat.com/CVE-2013-4002", "reference_id": "CVE-2013-4002", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/CVE-2013-4002" }, { "reference_url": "https://github.com/advisories/GHSA-7j4h-8wpf-rqfh", "reference_id": "GHSA-7j4h-8wpf-rqfh", "reference_type": "", "scores": [ { "value": "HIGH", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-7j4h-8wpf-rqfh" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1059", "reference_id": "RHSA-2013:1059", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1060", "reference_id": "RHSA-2013:1060", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1060" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1081", "reference_id": "RHSA-2013:1081", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1081" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1319", "reference_id": "RHSA-2014:1319", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1319" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1818", "reference_id": "RHSA-2014:1818", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1818" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1821", "reference_id": "RHSA-2014:1821", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1821" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1822", "reference_id": "RHSA-2014:1822", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1822" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1823", "reference_id": "RHSA-2014:1823", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1823" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0234", "reference_id": "RHSA-2015:0234", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0234" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0235", "reference_id": "RHSA-2015:0235", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0235" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0269", "reference_id": "RHSA-2015:0269", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0269" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0675", "reference_id": "RHSA-2015:0675", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0675" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0720", "reference_id": "RHSA-2015:0720", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0720" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0765", "reference_id": "RHSA-2015:0765", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0765" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0773", "reference_id": "RHSA-2015:0773", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0773" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-4002", "GHSA-7j4h-8wpf-rqfh" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6wc-3mp6-63ek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61125?format=api", "vulnerability_id": "VCID-aqtv-nbes-33aw", "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n allowing attackers to cause unspecified impact.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5838.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5838.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5838", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.87485", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.87495", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.87509", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.87511", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.8753", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.87537", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.87548", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.87544", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03468", "scoring_system": "epss", "scoring_elements": "0.8754", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5838" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019300", "reference_id": "1019300", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019300" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5838" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aqtv-nbes-33aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56404?format=api", "vulnerability_id": "VCID-bkcn-7xu6-g7at", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5850.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5850.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5850", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06689", "scoring_system": "epss", "scoring_elements": "0.9119", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06689", "scoring_system": "epss", "scoring_elements": "0.91195", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06689", "scoring_system": "epss", "scoring_elements": "0.91203", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06689", "scoring_system": "epss", "scoring_elements": "0.9121", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06689", "scoring_system": "epss", "scoring_elements": "0.91224", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06689", "scoring_system": "epss", "scoring_elements": "0.9123", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06689", "scoring_system": "epss", "scoring_elements": "0.91237", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06689", "scoring_system": "epss", "scoring_elements": "0.9124", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5850" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019127", "reference_id": "1019127", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019127" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5850" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcn-7xu6-g7at" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56395?format=api", "vulnerability_id": "VCID-dzaq-rw8t-wqba", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91003", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117", "reference_id": "1019117", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5814" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzaq-rw8t-wqba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56396?format=api", "vulnerability_id": "VCID-e62p-4szd-3ubj", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91003", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118", "reference_id": "1019118", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5817" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e62p-4szd-3ubj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56403?format=api", "vulnerability_id": "VCID-erxc-qxay-ayhr", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750", "reference_id": "1018750", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5849" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-erxc-qxay-ayhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56394?format=api", "vulnerability_id": "VCID-f4d5-mkub-b3e1", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91934", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91942", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.9195", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91956", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91974", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91977", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91976", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07797", "scoring_system": "epss", "scoring_elements": "0.91973", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113", "reference_id": "1019113", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5809" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d5-mkub-b3e1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56380?format=api", "vulnerability_id": "VCID-khuw-dsag-p7ey", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147", "reference_id": "1019147", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5774" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khuw-dsag-p7ey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56378?format=api", "vulnerability_id": "VCID-kn39-nd68-a7c8", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133", "reference_id": "1019133", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-3829" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kn39-nd68-a7c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56389?format=api", "vulnerability_id": "VCID-m2d2-shze-ybgs", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89082", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89091", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89105", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89108", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89126", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89131", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89142", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89138", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04507", "scoring_system": "epss", "scoring_elements": "0.89136", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130", "reference_id": "1019130", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5802" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2d2-shze-ybgs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56400?format=api", "vulnerability_id": "VCID-msup-sd1d-j3b8", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.9144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91448", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110", "reference_id": "1019110", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5830" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-msup-sd1d-j3b8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56405?format=api", "vulnerability_id": "VCID-n6gc-cnsc-z7a6", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5851.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.84836", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.84852", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.8487", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.84872", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.84895", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.84902", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.8492", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.84919", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02355", "scoring_system": "epss", "scoring_elements": "0.84913", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5851" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018977", "reference_id": "1018977", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018977" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5851" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n6gc-cnsc-z7a6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56399?format=api", "vulnerability_id": "VCID-n7ju-v5t7-h3eq", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91404", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91421", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.9144", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91446", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91449", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06966", "scoring_system": "epss", "scoring_elements": "0.91448", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115", "reference_id": "1019115", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5829" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ju-v5t7-h3eq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56383?format=api", "vulnerability_id": "VCID-pbdx-8nxr-nbew", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90953", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90967", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90977", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90988", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.90994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06362", "scoring_system": "epss", "scoring_elements": "0.91003", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108", "reference_id": "1019108", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5782" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbdx-8nxr-nbew" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56381?format=api", "vulnerability_id": "VCID-q5c8-hwra-zyfr", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84604", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84618", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84638", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.8464", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84662", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84669", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84686", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0228", "scoring_system": "epss", "scoring_elements": "0.84676", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984", "reference_id": "1018984", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5778" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5c8-hwra-zyfr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56390?format=api", "vulnerability_id": "VCID-qmvf-8y88-gqhh", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89591", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89604", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89605", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89622", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89627", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89634", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89633", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.04936", "scoring_system": "epss", "scoring_elements": "0.89626", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713", "reference_id": "1018713", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5803" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmvf-8y88-gqhh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56385?format=api", "vulnerability_id": "VCID-sk3j-q3uf-5yfp", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5784.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5784.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5784", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83896", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83927", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8393", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83953", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.8396", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83975", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83969", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02075", "scoring_system": "epss", "scoring_elements": "0.83965", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5784" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018727", "reference_id": "1018727", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018727" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5784" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sk3j-q3uf-5yfp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56384?format=api", "vulnerability_id": "VCID-uvbz-c5pd-a3hc", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85636", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85648", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85665", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85673", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85692", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85703", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85717", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85713", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0264", "scoring_system": "epss", "scoring_elements": "0.85709", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137", "reference_id": "1019137", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5783" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvbz-c5pd-a3hc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56388?format=api", "vulnerability_id": "VCID-x72p-yry2-bugs", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5800.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5800.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5800", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.84446", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.84461", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.8448", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.84482", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.84503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.84509", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.84528", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.84523", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02227", "scoring_system": "epss", "scoring_elements": "0.84519", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018755", "reference_id": "1018755", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018755" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5800" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x72p-yry2-bugs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56402?format=api", "vulnerability_id": "VCID-z63k-wes3-gqgw", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95477", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95486", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95492", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95497", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95503", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95506", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95511", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95512", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.20269", "scoring_system": "epss", "scoring_elements": "0.95513", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123", "reference_id": "1019123", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440", "reference_id": "RHSA-2013:1440", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1440" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447", "reference_id": "RHSA-2013:1447", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1447" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451", "reference_id": "RHSA-2013:1451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505", "reference_id": "RHSA-2013:1505", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1505" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507", "reference_id": "RHSA-2013:1507", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1507" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508", "reference_id": "RHSA-2013:1508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509", "reference_id": "RHSA-2013:1509", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1509" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793", "reference_id": "RHSA-2013:1793", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1793" }, { "reference_url": "https://usn.ubuntu.com/2033-1/", "reference_id": "USN-2033-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2033-1/" }, { "reference_url": "https://usn.ubuntu.com/2089-1/", "reference_id": "USN-2089-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2089-1/" } ], "fixed_packages": [], "aliases": [ "CVE-2013-5842" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z63k-wes3-gqgw" } ], "fixing_vulnerabilities": [], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.45-2.4.3.1%3Farch=el5_10" }