Lookup for vulnerable packages by Package URL.

GET /api/packages/125962?format=api
HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "url": "http://public2.vulnerablecode.io/api/packages/125962?format=api",
    "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.14.0-1jpp.1?arch=el5_8",
    "type": "rpm",
    "namespace": "redhat",
    "name": "java-1.5.0-ibm",
    "version": "1:1.5.0.14.0-1jpp.1",
    "qualifiers": {
        "arch": "el5_8"
    },
    "subpath": "",
    "is_vulnerable": true,
    "next_non_vulnerable_version": null,
    "latest_non_vulnerable_version": null,
    "affected_by_vulnerabilities": [
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56312?format=api",
            "vulnerability_id": "VCID-76wu-nfc9-ebb5",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1725",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89541",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1725"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376",
                    "reference_id": "829376",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829376"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1725"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76wu-nfc9-ebb5"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56310?format=api",
            "vulnerability_id": "VCID-fftg-8wp1-bqdy",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1719",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85149",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8516",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85178",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85179",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85201",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85209",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85224",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85221",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85217",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.02455",
                            "scoring_system": "epss",
                            "scoring_elements": "0.85238",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1719"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371",
                    "reference_id": "829371",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829371"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1243",
                    "reference_id": "RHSA-2012:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1332",
                    "reference_id": "RHSA-2012:1332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1719"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fftg-8wp1-bqdy"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56306?format=api",
            "vulnerability_id": "VCID-jrxs-q15y-pudg",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1713",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91008",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91013",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91022",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91032",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91044",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91051",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91059",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.9106",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0643",
                            "scoring_system": "epss",
                            "scoring_elements": "0.91083",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1713"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361",
                    "reference_id": "829361",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829361"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1243",
                    "reference_id": "RHSA-2012:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1332",
                    "reference_id": "RHSA-2012:1332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1713"
            ],
            "risk_score": 0.1,
            "exploitability": "0.5",
            "weighted_severity": "0.1",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jrxs-q15y-pudg"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56307?format=api",
            "vulnerability_id": "VCID-nj59-1wrw-kbd1",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1716",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89492",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89496",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89507",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89524",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89527",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89535",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89532",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89528",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.0484",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89541",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1716"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360",
                    "reference_id": "829360",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829360"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1716"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nj59-1wrw-kbd1"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56308?format=api",
            "vulnerability_id": "VCID-qswt-y34k-5kc8",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1717",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33088",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33219",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33252",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33084",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33127",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.3316",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33163",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33124",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.331",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.00134",
                            "scoring_system": "epss",
                            "scoring_elements": "0.33141",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1717"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358",
                    "reference_id": "829358",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829358"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1243",
                    "reference_id": "RHSA-2012:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1289",
                    "reference_id": "RHSA-2012:1289",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1289"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1332",
                    "reference_id": "RHSA-2012:1332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1717"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qswt-y34k-5kc8"
        },
        {
            "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56309?format=api",
            "vulnerability_id": "VCID-tt7k-yzuf-9bc4",
            "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.",
            "references": [
                {
                    "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1718.json",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1718.json"
                },
                {
                    "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1718",
                    "reference_id": "",
                    "reference_type": "",
                    "scores": [
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89836",
                            "published_at": "2026-04-01T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89839",
                            "published_at": "2026-04-02T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89852",
                            "published_at": "2026-04-04T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89857",
                            "published_at": "2026-04-07T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89874",
                            "published_at": "2026-04-08T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.8988",
                            "published_at": "2026-04-09T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89887",
                            "published_at": "2026-04-11T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89884",
                            "published_at": "2026-04-12T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89877",
                            "published_at": "2026-04-13T12:55:00Z"
                        },
                        {
                            "value": "0.05146",
                            "scoring_system": "epss",
                            "scoring_elements": "0.89892",
                            "published_at": "2026-04-16T12:55:00Z"
                        }
                    ],
                    "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-1718"
                },
                {
                    "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372",
                    "reference_id": "829372",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://bugzilla.redhat.com/show_bug.cgi?id=829372"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201401-30",
                    "reference_id": "GLSA-201401-30",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201401-30"
                },
                {
                    "reference_url": "https://security.gentoo.org/glsa/201406-32",
                    "reference_id": "GLSA-201406-32",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://security.gentoo.org/glsa/201406-32"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0729",
                    "reference_id": "RHSA-2012:0729",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0729"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0730",
                    "reference_id": "RHSA-2012:0730",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0730"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:0734",
                    "reference_id": "RHSA-2012:0734",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:0734"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1009",
                    "reference_id": "RHSA-2012:1009",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1009"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1019",
                    "reference_id": "RHSA-2012:1019",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1019"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1238",
                    "reference_id": "RHSA-2012:1238",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1238"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1243",
                    "reference_id": "RHSA-2012:1243",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1243"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1245",
                    "reference_id": "RHSA-2012:1245",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1245"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1332",
                    "reference_id": "RHSA-2012:1332",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1332"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2012:1467",
                    "reference_id": "RHSA-2012:1467",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2012:1467"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455",
                    "reference_id": "RHSA-2013:1455",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1455"
                },
                {
                    "reference_url": "https://access.redhat.com/errata/RHSA-2013:1456",
                    "reference_id": "RHSA-2013:1456",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://access.redhat.com/errata/RHSA-2013:1456"
                },
                {
                    "reference_url": "https://usn.ubuntu.com/1505-1/",
                    "reference_id": "USN-1505-1",
                    "reference_type": "",
                    "scores": [],
                    "url": "https://usn.ubuntu.com/1505-1/"
                }
            ],
            "fixed_packages": [],
            "aliases": [
                "CVE-2012-1718"
            ],
            "risk_score": null,
            "exploitability": "0.5",
            "weighted_severity": "0.0",
            "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tt7k-yzuf-9bc4"
        }
    ],
    "fixing_vulnerabilities": [],
    "risk_score": "0.1",
    "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.14.0-1jpp.1%3Farch=el5_8"
}