Lookup for vulnerable packages by Package URL.

GET /api/packages/123547?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/123547?format=api",
    "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.45-1jpp.2?arch=el6_4",
    "type": "rpm",
    "namespace": "redhat",
    "name": "java-1.7.0-oracle",
    "version": "1:1.7.0.45-1jpp.2",
    "qualifiers": {
        "arch": "el6_4"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56379?format=api",
            "vulnerability_id": "VCID-17nn-wrs1-fkb6",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5772.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5772.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5772",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5772"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018717",
                    "reference_id": "1018717",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018717"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5772"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-17nn-wrs1-fkb6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56401?format=api",
            "vulnerability_id": "VCID-2gme-zs8y-bqec",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5840"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831",
                    "reference_id": "1018831",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018831"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5840"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2gme-zs8y-bqec"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56397?format=api",
            "vulnerability_id": "VCID-2jj1-ebr5-5bbj",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5820.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5820.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5820",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5820"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018972",
                    "reference_id": "1018972",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018972"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5820"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2jj1-ebr5-5bbj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56398?format=api",
            "vulnerability_id": "VCID-2nc7-hgsm-9yd7",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89604",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89641",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89642",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89636",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5825"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139",
                    "reference_id": "1019139",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019139"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5825"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nc7-hgsm-9yd7"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61111?format=api",
            "vulnerability_id": "VCID-42sk-j4hm-rkgk",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5777.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5777.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5777",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75797",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75801",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75833",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75812",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75844",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75856",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75879",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75861",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75854",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75891",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75895",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00912",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75881",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5777"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722",
                    "reference_id": "1019722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5777"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42sk-j4hm-rkgk"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61128?format=api",
            "vulnerability_id": "VCID-452s-21q5-rfh3",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5846.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5846.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5846",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81645",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81679",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81676",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81703",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81727",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81715",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81708",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81747",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81746",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8175",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5846"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722",
                    "reference_id": "1019722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5846"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-452s-21q5-rfh3"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61123?format=api",
            "vulnerability_id": "VCID-4j1g-wau3-3ya5",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5831.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5831.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5831",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82873",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82886",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82882",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82907",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82915",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8293",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82925",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82922",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82961",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8296",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82964",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5831"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019716",
                    "reference_id": "1019716",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019716"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5831"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4j1g-wau3-3ya5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61112?format=api",
            "vulnerability_id": "VCID-5fd6-geeb-fufj",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5787.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5787.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5787",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89543",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8954",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5787"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019693",
                    "reference_id": "1019693",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019693"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5787"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5fd6-geeb-fufj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56386?format=api",
            "vulnerability_id": "VCID-6dhw-uqtb-kua5",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5790"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736",
                    "reference_id": "1018736",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018736"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5790"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhw-uqtb-kua5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4981?format=api",
            "vulnerability_id": "VCID-6q4h-4h6p-nufq",
            "summary": "Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.",
            "references": [
                {
                    "reference_url": "http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/a7758faab30d",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/a7758faab30d"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0414"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5823.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5823.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89636",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89604",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89641",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89642",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5823"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/55a48497dfbf3fe63a81e67c13160b3f41ebb1f3",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/55a48497dfbf3fe63a81e67c13160b3f41ebb1f3"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710"
                },
                {
                    "reference_url": "https://github.com/apache/santuario-java/commit/f9a61f2df9473237aa71308c28113540b4063d33",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/santuario-java/commit/f9a61f2df9473237aa71308c28113540b4063d33"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/SANTUARIO-334",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://issues.apache.org/jira/browse/SANTUARIO-334"
                },
                {
                    "reference_url": "https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
                },
                {
                    "reference_url": "https://marc.info/?l=bugtraq&m=138674031212883&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://marc.info/?l=bugtraq&m=138674031212883&w=2"
                },
                {
                    "reference_url": "https://marc.info/?l=bugtraq&m=138674073720143&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://marc.info/?l=bugtraq&m=138674073720143&w=2"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5823",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-5823"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/glsa-201406-32.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://security.gentoo.org/glsa/glsa-201406-32.xml"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=1367492",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://svn.apache.org/viewvc?view=revision&revision=1367492"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019145",
                    "reference_id": "1019145",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019145"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/CVE-2013-5823",
                    "reference_id": "CVE-2013-5823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/CVE-2013-5823"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-8gwc-x7mg-7p7p",
                    "reference_id": "GHSA-8gwc-x7mg-7p7p",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "MODERATE",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-8gwc-x7mg-7p7p"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5823",
                "GHSA-8gwc-x7mg-7p7p"
            ],
            "risk_score": 3.1,
            "exploitability": "0.5",
            "weighted_severity": "6.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-6q4h-4h6p-nufq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61113?format=api",
            "vulnerability_id": "VCID-7n2c-p6xz-97gw",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5788.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5788.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5788",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77923",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7793",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77957",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77939",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77966",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7797",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77997",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77981",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7798",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78015",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78014",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01094",
                            "scoring_system": "epss",
                            "scoring_elements": "0.78007",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5788"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019692",
                    "reference_id": "1019692",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019692"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5788"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7n2c-p6xz-97gw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61127?format=api",
            "vulnerability_id": "VCID-818r-ddzw-a3g5",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5844.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5844.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5844",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81645",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81656",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81679",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81676",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81703",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81707",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81727",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81715",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81708",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81747",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81746",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01602",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8175",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5844"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722",
                    "reference_id": "1019722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5844"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-818r-ddzw-a3g5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56391?format=api",
            "vulnerability_id": "VCID-831v-7kmc-aucv",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5804"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131",
                    "reference_id": "1019131",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019131"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5804"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-831v-7kmc-aucv"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56387?format=api",
            "vulnerability_id": "VCID-8faz-85u1-zbeq",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44815",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44896",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44915",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44856",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44908",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4491",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.4493",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.449",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44953",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00222",
                            "scoring_system": "epss",
                            "scoring_elements": "0.44946",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5797"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720",
                    "reference_id": "1018720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5797"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8faz-85u1-zbeq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56382?format=api",
            "vulnerability_id": "VCID-98s6-fdp7-gkg6",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5780"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785",
                    "reference_id": "1018785",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018785"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5780"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98s6-fdp7-gkg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/4827?format=api",
            "vulnerability_id": "VCID-a6wc-3mp6-63ek",
            "summary": "XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.",
            "references": [
                {
                    "reference_url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"
                },
                {
                    "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://marc.info/?l=bugtraq&m=138674031212883&w=2"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://marc.info/?l=bugtraq&m=138674073720143&w=2"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1059.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1060.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1081.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1440.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1447.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1451.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2013-1505.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1818.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1818.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1821.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1821.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1822.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1822.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1823.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2014-1823.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0675.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0720.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0765.html"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2015-0773.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:0414",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://access.redhat.com/errata/RHSA-2014:0414"
                },
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4002.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4002.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90327",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90269",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90272",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90286",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9029",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90305",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90312",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9032",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90319",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90313",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05597",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90329",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-4002"
                },
                {
                    "reference_url": "http://secunia.com/advisories/56257",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://secunia.com/advisories/56257"
                },
                {
                    "reference_url": "http://security.gentoo.org/glsa/glsa-201406-32.xml",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml"
                },
                {
                    "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85260"
                },
                {
                    "reference_url": "https://github.com/apache/xerces2-j",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/xerces2-j"
                },
                {
                    "reference_url": "https://github.com/apache/xerces2-j/commit/266e837852e0f0e3c8c1ad572b6fc4dbb4ded17",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/apache/xerces2-j/commit/266e837852e0f0e3c8c1ad572b6fc4dbb4ded17"
                },
                {
                    "reference_url": "https://github.com/apache/xerces2-j/commit/628cbc7142ef9acfb61b8e571aab63504235849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://github.com/apache/xerces2-j/commit/628cbc7142ef9acfb61b8e571aab63504235849"
                },
                {
                    "reference_url": "https://issues.apache.org/jira/browse/XERCESJ-1679",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://issues.apache.org/jira/browse/XERCESJ-1679"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "7.1",
                            "scoring_system": "cvssv2",
                            "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:N/A:C"
                        },
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4002"
                },
                {
                    "reference_url": "http://support.apple.com/kb/HT5982",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://support.apple.com/kb/HT5982"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=1499506",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://svn.apache.org/viewvc?view=revision&revision=1499506"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch"
                },
                {
                    "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
                },
                {
                    "reference_url": "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21644197"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21653371",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21653371"
                },
                {
                    "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21657539",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21657539"
                },
                {
                    "reference_url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"
                },
                {
                    "reference_url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002"
                },
                {
                    "reference_url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=swg21648172",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ibm.com/support/docview.wss?uid=swg21648172"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/61310",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://www.securityfocus.com/bid/61310"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2033-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2033-1"
                },
                {
                    "reference_url": "http://www.ubuntu.com/usn/USN-2089-1",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "generic_textual",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "http://www.ubuntu.com/usn/USN-2089-1"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019176",
                    "reference_id": "1019176",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019176"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*",
                    "reference_id": "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"
                },
                {
                    "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
                    "reference_id": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/CVE-2013-4002",
                    "reference_id": "CVE-2013-4002",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/CVE-2013-4002"
                },
                {
                    "reference_url": "https://github.com/advisories/GHSA-7j4h-8wpf-rqfh",
                    "reference_id": "GHSA-7j4h-8wpf-rqfh",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "HIGH",
                            "scoring_system": "cvssv3.1_qr",
                            "scoring_elements": ""
                        }
                    ],
                    "url": "https://github.com/advisories/GHSA-7j4h-8wpf-rqfh"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1059",
                    "reference_id": "RHSA-2013:1059",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1059"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1060",
                    "reference_id": "RHSA-2013:1060",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1060"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1081",
                    "reference_id": "RHSA-2013:1081",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1081"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1319",
                    "reference_id": "RHSA-2014:1319",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1319"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1818",
                    "reference_id": "RHSA-2014:1818",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1818"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1821",
                    "reference_id": "RHSA-2014:1821",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1821"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1822",
                    "reference_id": "RHSA-2014:1822",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1822"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2014:1823",
                    "reference_id": "RHSA-2014:1823",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2014:1823"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0234",
                    "reference_id": "RHSA-2015:0234",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0234"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0235",
                    "reference_id": "RHSA-2015:0235",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0235"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0269",
                    "reference_id": "RHSA-2015:0269",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0269"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0675",
                    "reference_id": "RHSA-2015:0675",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0675"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0720",
                    "reference_id": "RHSA-2015:0720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0720"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0765",
                    "reference_id": "RHSA-2015:0765",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0765"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2015:0773",
                    "reference_id": "RHSA-2015:0773",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2015:0773"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-4002",
                "GHSA-7j4h-8wpf-rqfh"
            ],
            "risk_score": 4.0,
            "exploitability": "0.5",
            "weighted_severity": "8.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a6wc-3mp6-63ek"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61125?format=api",
            "vulnerability_id": "VCID-aqtv-nbes-33aw",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5838.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5838.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5838",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87485",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87495",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87509",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87511",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8753",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87537",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87548",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87544",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8754",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87555",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87556",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.03468",
                            "scoring_system": "epss",
                            "scoring_elements": "0.87554",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5838"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019300",
                    "reference_id": "1019300",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019300"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5838"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aqtv-nbes-33aw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56404?format=api",
            "vulnerability_id": "VCID-bkcn-7xu6-g7at",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5850.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5850.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5850",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9119",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91195",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91203",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91224",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9123",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91237",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9124",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91264",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06689",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91265",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5850"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019127",
                    "reference_id": "1019127",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019127"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5850"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcn-7xu6-g7at"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56395?format=api",
            "vulnerability_id": "VCID-dzaq-rw8t-wqba",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91027",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91026",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5814"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117",
                    "reference_id": "1019117",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019117"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5814"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dzaq-rw8t-wqba"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56396?format=api",
            "vulnerability_id": "VCID-e62p-4szd-3ubj",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91027",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91026",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5817"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118",
                    "reference_id": "1019118",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019118"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5817"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-e62p-4szd-3ubj"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56403?format=api",
            "vulnerability_id": "VCID-erxc-qxay-ayhr",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5849"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750",
                    "reference_id": "1018750",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018750"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5849"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-erxc-qxay-ayhr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56394?format=api",
            "vulnerability_id": "VCID-f4d5-mkub-b3e1",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91934",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91942",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9195",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91956",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91969",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91974",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91977",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91976",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91973",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91992",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.07797",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91985",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5809"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113",
                    "reference_id": "1019113",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019113"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5809"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d5-mkub-b3e1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61126?format=api",
            "vulnerability_id": "VCID-ha9m-r5c1-2ffd",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5843.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5843.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5843",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89555",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89559",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89572",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89573",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89589",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89594",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89601",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.896",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89608",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89609",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04897",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5843"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019701",
                    "reference_id": "1019701",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019701"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5843"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ha9m-r5c1-2ffd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61130?format=api",
            "vulnerability_id": "VCID-j7g4-h24q-ckc9",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5852.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5852.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5852",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81088",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81097",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81122",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81121",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81149",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81155",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81174",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8116",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81154",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8119",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.01503",
                            "scoring_system": "epss",
                            "scoring_elements": "0.81192",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5852"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019705",
                    "reference_id": "1019705",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019705"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5852"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j7g4-h24q-ckc9"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61122?format=api",
            "vulnerability_id": "VCID-jktb-47k1-rffu",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5824.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5824.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5824",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89543",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8954",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5824"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019691",
                    "reference_id": "1019691",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019691"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5824"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jktb-47k1-rffu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61109?format=api",
            "vulnerability_id": "VCID-kggz-28dg-dubz",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5775.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5775.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5775",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69171",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69187",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69208",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69189",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69239",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69257",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6928",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69265",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69236",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69276",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69284",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00592",
                            "scoring_system": "epss",
                            "scoring_elements": "0.69264",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5775"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722",
                    "reference_id": "1019722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5775"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kggz-28dg-dubz"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56380?format=api",
            "vulnerability_id": "VCID-khuw-dsag-p7ey",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5774"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147",
                    "reference_id": "1019147",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019147"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5774"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-khuw-dsag-p7ey"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56378?format=api",
            "vulnerability_id": "VCID-kn39-nd68-a7c8",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-3829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133",
                    "reference_id": "1019133",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019133"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-3829"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kn39-nd68-a7c8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61131?format=api",
            "vulnerability_id": "VCID-kufr-v4kx-a7da",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5854.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5854.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5854",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59435",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59508",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59533",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59502",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59553",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59566",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59584",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59568",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59548",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59582",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59589",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.00381",
                            "scoring_system": "epss",
                            "scoring_elements": "0.59571",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5854"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722",
                    "reference_id": "1019722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5854"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kufr-v4kx-a7da"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56389?format=api",
            "vulnerability_id": "VCID-m2d2-shze-ybgs",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89082",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89091",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89105",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89108",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89126",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89131",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89142",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89138",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89136",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89149",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04507",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89146",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5802"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130",
                    "reference_id": "1019130",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019130"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5802"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m2d2-shze-ybgs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61124?format=api",
            "vulnerability_id": "VCID-mmhg-araa-fkb8",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5832.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5832.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5832",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89849",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89852",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89866",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89871",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89887",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89894",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89901",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89899",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89892",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89906",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89907",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.05159",
                            "scoring_system": "epss",
                            "scoring_elements": "0.899",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5832"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019702",
                    "reference_id": "1019702",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019702"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5832"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mmhg-araa-fkb8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56400?format=api",
            "vulnerability_id": "VCID-msup-sd1d-j3b8",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91421",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91446",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91448",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91467",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5830"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110",
                    "reference_id": "1019110",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019110"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5830"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-msup-sd1d-j3b8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56405?format=api",
            "vulnerability_id": "VCID-n6gc-cnsc-z7a6",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5851.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5851.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5851",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84836",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84852",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8487",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84872",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84895",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84902",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8492",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84919",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84913",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84934",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84935",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02355",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84933",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5851"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018977",
                    "reference_id": "1018977",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018977"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5851"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n6gc-cnsc-z7a6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56399?format=api",
            "vulnerability_id": "VCID-n7ju-v5t7-h3eq",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91398",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91404",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91414",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91421",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91433",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9144",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91446",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91449",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91448",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91471",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06966",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91467",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5829"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115",
                    "reference_id": "1019115",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019115"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5829"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ju-v5t7-h3eq"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56383?format=api",
            "vulnerability_id": "VCID-pbdx-8nxr-nbew",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90953",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90958",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90967",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90977",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90988",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.90994",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91003",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91027",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91026",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.06362",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91028",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5782"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108",
                    "reference_id": "1019108",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019108"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5782"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pbdx-8nxr-nbew"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56381?format=api",
            "vulnerability_id": "VCID-q5c8-hwra-zyfr",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84604",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84618",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84638",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8464",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84662",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84669",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84686",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84681",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84676",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84698",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84699",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0228",
                            "scoring_system": "epss",
                            "scoring_elements": "0.847",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5778"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984",
                    "reference_id": "1018984",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018984"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5778"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q5c8-hwra-zyfr"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56390?format=api",
            "vulnerability_id": "VCID-qmvf-8y88-gqhh",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89588",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89591",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89604",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89605",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89622",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89627",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89634",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89633",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89626",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89641",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89642",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04936",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89636",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5803"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713",
                    "reference_id": "1018713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018713"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5803"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qmvf-8y88-gqhh"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61117?format=api",
            "vulnerability_id": "VCID-r3jr-7dkg-5khb",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5801.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5801.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5801",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84724",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84739",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84759",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84761",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84783",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8479",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84808",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84804",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84799",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8482",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84821",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02321",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84819",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5801"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019710",
                    "reference_id": "1019710",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019710"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5801"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r3jr-7dkg-5khb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61119?format=api",
            "vulnerability_id": "VCID-r6a5-wtaz-8bgu",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5812.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5812.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5812",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88674",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88683",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88699",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.887",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88718",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88723",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88735",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88729",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88742",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8874",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.04198",
                            "scoring_system": "epss",
                            "scoring_elements": "0.88739",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5812"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019706",
                    "reference_id": "1019706",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019706"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5812"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r6a5-wtaz-8bgu"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56385?format=api",
            "vulnerability_id": "VCID-sk3j-q3uf-5yfp",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5784.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5784.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5784",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83896",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83911",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83927",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8393",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83953",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8396",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83975",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83969",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83965",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83989",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02075",
                            "scoring_system": "epss",
                            "scoring_elements": "0.83991",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5784"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018727",
                    "reference_id": "1018727",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018727"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5784"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-sk3j-q3uf-5yfp"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61114?format=api",
            "vulnerability_id": "VCID-te2n-je4h-j7bc",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5789.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5789.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5789",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89541",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89543",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8954",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5789"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019697",
                    "reference_id": "1019697",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019697"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5789"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-te2n-je4h-j7bc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61118?format=api",
            "vulnerability_id": "VCID-tfzc-gyvj-5yh8",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5810.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5810.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5810",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77428",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77435",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7746",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7744",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.7747",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77479",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77505",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77486",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77482",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77521",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77518",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01045",
                            "scoring_system": "epss",
                            "scoring_elements": "0.77511",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5810"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722",
                    "reference_id": "1019722",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019722"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5810"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tfzc-gyvj-5yh8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56384?format=api",
            "vulnerability_id": "VCID-uvbz-c5pd-a3hc",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85636",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85648",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85665",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85673",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85692",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85703",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85717",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85713",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85709",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85731",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85736",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.0264",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8573",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5783"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137",
                    "reference_id": "1019137",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019137"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5783"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-uvbz-c5pd-a3hc"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61121?format=api",
            "vulnerability_id": "VCID-vf6r-a833-fbg6",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5819.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5819.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5819",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82873",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82886",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82882",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82907",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82915",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8293",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82925",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82922",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82961",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8296",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82964",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5819"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019715",
                    "reference_id": "1019715",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019715"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5819"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vf6r-a833-fbg6"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61129?format=api",
            "vulnerability_id": "VCID-wj8s-enzz-aka2",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5848.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5848.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5848",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85149",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8516",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85179",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85201",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85209",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85224",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85221",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85217",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85238",
                            "published_at": "2026-04-21T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85239",
                            "published_at": "2026-04-18T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5848"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019720",
                    "reference_id": "1019720",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019720"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5848"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wj8s-enzz-aka2"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61120?format=api",
            "vulnerability_id": "VCID-x65k-nney-23b5",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5818.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5818.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5818",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82873",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82886",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82882",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82907",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82915",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8293",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82925",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82922",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82961",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8296",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82964",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5818"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019713",
                    "reference_id": "1019713",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019713"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5818"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x65k-nney-23b5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56388?format=api",
            "vulnerability_id": "VCID-x72p-yry2-bugs",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5800.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5800.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5800",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84446",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84461",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8448",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84482",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84509",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84528",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84523",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84519",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84539",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.02227",
                            "scoring_system": "epss",
                            "scoring_elements": "0.84541",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5800"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018755",
                    "reference_id": "1018755",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018755"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5800"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x72p-yry2-bugs"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56402?format=api",
            "vulnerability_id": "VCID-z63k-wes3-gqgw",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95477",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95486",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95492",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95497",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95503",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95506",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95511",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95512",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95513",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95521",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95526",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.20269",
                            "scoring_system": "epss",
                            "scoring_elements": "0.95529",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5842"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123",
                    "reference_id": "1019123",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019123"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1447",
                    "reference_id": "RHSA-2013:1447",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1447"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1451",
                    "reference_id": "RHSA-2013:1451",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1451"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1505",
                    "reference_id": "RHSA-2013:1505",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1505"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1509",
                    "reference_id": "RHSA-2013:1509",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1509"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2033-1/",
                    "reference_id": "USN-2033-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2033-1/"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/2089-1/",
                    "reference_id": "USN-2089-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/2089-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5842"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.2",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z63k-wes3-gqgw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61110?format=api",
            "vulnerability_id": "VCID-zx4b-qwy1-fkf8",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5776.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5776.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5776",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82857",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82873",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82886",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82882",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82907",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82915",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8293",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82925",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82922",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82961",
                            "published_at": "2026-04-16T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8296",
                            "published_at": "2026-04-18T12:55:00Z"
                        },
                        {
                            "value": "0.01834",
                            "scoring_system": "epss",
                            "scoring_elements": "0.82964",
                            "published_at": "2026-04-21T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-5776"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019712",
                    "reference_id": "1019712",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1019712"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1440",
                    "reference_id": "RHSA-2013:1440",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1440"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1507",
                    "reference_id": "RHSA-2013:1507",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1507"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1508",
                    "reference_id": "RHSA-2013:1508",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1508"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1793",
                    "reference_id": "RHSA-2013:1793",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1793"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2013-5776"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zx4b-qwy1-fkf8"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "4.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.45-1jpp.2%3Farch=el6_4"
}