Lookup for vulnerable packages by Package URL.

GET /api/packages/125953?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/125953?format=api",
    "purl": "pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.5-1jpp.1?arch=el6",
    "type": "rpm",
    "namespace": "redhat",
    "name": "java-1.7.0-oracle",
    "version": "1:1.7.0.5-1jpp.1",
    "qualifiers": {
        "arch": "el6"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56313?format=api",
            "vulnerability_id": "VCID-4arp-hkg6-w7hd",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1726.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1726.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1726",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61609",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61683",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61713",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61685",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61734",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61749",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6177",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61758",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.61739",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00417",
                            "scoring_system": "epss",
                            "scoring_elements": "0.6178",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1726"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829377",
                    "reference_id": "829377",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829377"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1726"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4arp-hkg6-w7hd"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56312?format=api",
            "vulnerability_id": "VCID-76wu-nfc9-ebb5",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89541",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1725"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376",
                    "reference_id": "829376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1725"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76wu-nfc9-ebb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61036?format=api",
            "vulnerability_id": "VCID-91fb-xx5h-ukfx",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1721.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1721.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1721",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86527",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86538",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86556",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86575",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86585",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86597",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86604",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1721"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353",
                    "reference_id": "831353",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831353"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1721"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-91fb-xx5h-ukfx"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56305?format=api",
            "vulnerability_id": "VCID-9n7g-864v-hufw",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1711.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1711.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1711",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75035",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75037",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75066",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75043",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75077",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75088",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75111",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75089",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75078",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00863",
                            "scoring_system": "epss",
                            "scoring_elements": "0.75116",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1711"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354",
                    "reference_id": "829354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829354"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1711"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9n7g-864v-hufw"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87062?format=api",
            "vulnerability_id": "VCID-dkkq-dwta-nudb",
            "summary": "JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0551.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0551.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0551",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96545",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96554",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9656",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96563",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96571",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96573",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96575",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96576",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96578",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.29065",
                            "scoring_system": "epss",
                            "scoring_elements": "0.96585",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0551"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355",
                    "reference_id": "831355",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831355"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/webapps/18764.txt",
                    "reference_id": "CVE-2012-0551;OSVDB-81250;OSVDB-81237;OSVDB-81236;OSVDB-81235;OSVDB-81234;OSVDB-81233;OSVDB-81232;OSVDB-81231;OSVDB-81230;OSVDB-81229;OSVDB-81228;OSVDB-81227;OSVDB-81226",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/webapps/18764.txt"
                },
                {
                    "reference_url": "http://www.security-assessment.com/files/documents/advisory/Oracle_GlassFish_Server_Multiple_XSS.pdf",
                    "reference_id": "CVE-2012-0551;OSVDB-81250;OSVDB-81237;OSVDB-81236;OSVDB-81235;OSVDB-81234;OSVDB-81233;OSVDB-81232;OSVDB-81231;OSVDB-81230;OSVDB-81229;OSVDB-81228;OSVDB-81227;OSVDB-81226",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "http://www.security-assessment.com/files/documents/advisory/Oracle_GlassFish_Server_Multiple_XSS.pdf"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-0551"
            ],
            "risk_score": 0.6,
            "exploitability": "2.0",
            "weighted_severity": "0.3",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dkkq-dwta-nudb"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61037?format=api",
            "vulnerability_id": "VCID-fejr-r95x-5bht",
            "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1722.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1722.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1722",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86527",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86538",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86556",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86575",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86585",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.866",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86597",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8659",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.03008",
                            "scoring_system": "epss",
                            "scoring_elements": "0.86604",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1722"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354",
                    "reference_id": "831354",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=831354"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1722"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fejr-r95x-5bht"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56310?format=api",
            "vulnerability_id": "VCID-fftg-8wp1-bqdy",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85149",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8516",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85179",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85201",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85209",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85224",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85221",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85217",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85238",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1719"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371",
                    "reference_id": "829371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1243",
                    "reference_id": "RHSA-2012:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1332",
                    "reference_id": "RHSA-2012:1332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1719"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fftg-8wp1-bqdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56306?format=api",
            "vulnerability_id": "VCID-jrxs-q15y-pudg",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91008",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91013",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91022",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91032",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91044",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91051",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91059",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9106",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91083",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1713"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361",
                    "reference_id": "829361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1243",
                    "reference_id": "RHSA-2012:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1332",
                    "reference_id": "RHSA-2012:1332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1713"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jrxs-q15y-pudg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56307?format=api",
            "vulnerability_id": "VCID-nj59-1wrw-kbd1",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89541",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360",
                    "reference_id": "829360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1716"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nj59-1wrw-kbd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56311?format=api",
            "vulnerability_id": "VCID-p127-f7pc-gfen",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1723.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1723.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1723",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.94083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99904",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.94083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99905",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.94083",
                            "scoring_system": "epss",
                            "scoring_elements": "0.99906",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1723"
                },
                {
                    "reference_url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html",
                    "reference_id": "019076.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html"
                },
                {
                    "reference_url": "http://secunia.com/advisories/51080",
                    "reference_id": "51080",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "http://secunia.com/advisories/51080"
                },
                {
                    "reference_url": "http://www.securityfocus.com/bid/53960",
                    "reference_id": "53960",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "http://www.securityfocus.com/bid/53960"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373",
                    "reference_id": "829373",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829373"
                },
                {
                    "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095",
                    "reference_id": "advisories?name=MDVSA-2012:095",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:095"
                },
                {
                    "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/remote/19717.rb",
                    "reference_id": "CVE-2012-1723;OSVDB-82877",
                    "reference_type": "exploit",
                    "scores": [],
                    "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/remote/19717.rb"
                },
                {
                    "reference_url": "http://www.ibm.com/support/docview.wss?uid=swg21615246",
                    "reference_id": "docview.wss?uid=swg21615246",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "http://www.ibm.com/support/docview.wss?uid=swg21615246"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html",
                    "reference_id": "javacpujun2012-1515912.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html"
                },
                {
                    "reference_url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2",
                    "reference_id": "?l=bugtraq&m=134496371727681&w=2",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "http://marc.info/?l=bugtraq&m=134496371727681&w=2"
                },
                {
                    "reference_url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259",
                    "reference_id": "oval%3Aorg.mitre.oval%3Adef%3A16259",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html",
                    "reference_id": "RHSA-2012-0734.html",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "9.8",
                            "scoring_system": "cvssv3.1",
                            "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
                        },
                        {
                            "value": "Act",
                            "scoring_system": "ssvc",
                            "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"
                        }
                    ],
                    "url": "http://rhn.redhat.com/errata/RHSA-2012-0734.html"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1723"
            ],
            "risk_score": 10.0,
            "exploitability": "2.0",
            "weighted_severity": "8.8",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p127-f7pc-gfen"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6732?format=api",
            "vulnerability_id": "VCID-qfw9-f3rm-kfah",
            "summary": "Excessive Iteration\nXerces allows remote attackers to affect availability.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1724.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1724.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1724",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85238",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8525",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85269",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8527",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85292",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.853",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85315",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85313",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8531",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02488",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8533",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1724"
                },
                {
                    "reference_url": "http://svn.apache.org/viewvc?view=revision&revision=319059",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "http://svn.apache.org/viewvc?view=revision&revision=319059"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374",
                    "reference_id": "829374",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829374"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/CVE-2012-1724",
                    "reference_id": "CVE-2012-1724",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/CVE-2012-1724"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1724"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qfw9-f3rm-kfah"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56308?format=api",
            "vulnerability_id": "VCID-qswt-y34k-5kc8",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33088",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33219",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33252",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33084",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33127",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3316",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33163",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33124",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.331",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33141",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1717"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358",
                    "reference_id": "829358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1243",
                    "reference_id": "RHSA-2012:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1332",
                    "reference_id": "RHSA-2012:1332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1717"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qswt-y34k-5kc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56309?format=api",
            "vulnerability_id": "VCID-tt7k-yzuf-9bc4",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89836",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89839",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89852",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89857",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8988",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89887",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89884",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89877",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89892",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1718"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372",
                    "reference_id": "829372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1243",
                    "reference_id": "RHSA-2012:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1332",
                    "reference_id": "RHSA-2012:1332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1467",
                    "reference_id": "RHSA-2012:1467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1467"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1718"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tt7k-yzuf-9bc4"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "10.0",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.5-1jpp.1%3Farch=el6"
}