Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/126167?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/126167?format=api", "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.10.1-1jpp.1?arch=el5", "type": "rpm", "namespace": "redhat", "name": "java-1.6.0-ibm", "version": "1:1.6.0.10.1-1jpp.1", "qualifiers": { "arch": "el5" }, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56302?format=api", "vulnerability_id": "VCID-2udw-8wht-fbgt", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0505.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0505.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83519", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83545", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83547", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83571", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.8358", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83595", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83619", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0505" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299", "reference_id": "789299", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789299" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0702", "reference_id": "RHSA-2012:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1080", "reference_id": "RHSA-2012:1080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0505" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2udw-8wht-fbgt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61027?format=api", "vulnerability_id": "VCID-8a83-3gjn-k3ge", "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n allowing attackers to cause unspecified impact.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0499.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0499.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0499", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93104", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93114", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93117", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93124", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93129", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93134", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93131", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.93133", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.10203", "scoring_system": "epss", "scoring_elements": "0.9315", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0499" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722", "reference_id": "790722", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790722" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0702", "reference_id": "RHSA-2012:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1080", "reference_id": "RHSA-2012:1080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0499" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8a83-3gjn-k3ge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56295?format=api", "vulnerability_id": "VCID-9hpn-u1y1-9bdf", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3563.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3563.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3563", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89836", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89839", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89852", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89857", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89874", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.8988", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89884", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89892", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3563" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295", "reference_id": "789295", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789295" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0702", "reference_id": "RHSA-2012:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1080", "reference_id": "RHSA-2012:1080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-3563" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9hpn-u1y1-9bdf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56300?format=api", "vulnerability_id": "VCID-dt9f-ns4h-judb", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0502.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0502.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0502", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83047", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83063", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83077", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83075", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83099", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83107", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83123", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83117", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.83113", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01874", "scoring_system": "epss", "scoring_elements": "0.8315", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0502" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297", "reference_id": "789297", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789297" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0702", "reference_id": "RHSA-2012:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1080", "reference_id": "RHSA-2012:1080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0502" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dt9f-ns4h-judb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56297?format=api", "vulnerability_id": "VCID-dxv7-9y1b-pff7", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5035.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-5035.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5035", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.98196", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.98199", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.98203", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.98204", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.98209", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.9821", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.98213", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.98212", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.58626", "scoring_system": "epss", "scoring_elements": "0.98218", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-5035" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283", "reference_id": "771283", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=771283" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2011-5035" ], "risk_score": 1.0, "exploitability": "2.0", "weighted_severity": "0.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dxv7-9y1b-pff7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56299?format=api", "vulnerability_id": "VCID-fc7q-fpp2-7yfy", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0501.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0501.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0501", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89836", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89839", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89852", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89857", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89874", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.8988", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89887", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89884", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89877", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05146", "scoring_system": "epss", "scoring_elements": "0.89892", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0501" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624", "reference_id": "788624", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788624" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0501" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fc7q-fpp2-7yfy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61026?format=api", "vulnerability_id": "VCID-hjsb-ex5e-8qfv", "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n allowing attackers to cause unspecified impact.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0498.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0498.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0498", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.08035", "scoring_system": "epss", "scoring_elements": "0.92085", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.08035", "scoring_system": "epss", "scoring_elements": "0.92092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.08035", "scoring_system": "epss", "scoring_elements": "0.92099", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.08035", "scoring_system": "epss", "scoring_elements": "0.92103", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.08035", "scoring_system": "epss", "scoring_elements": "0.92115", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.08035", "scoring_system": "epss", "scoring_elements": "0.92118", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.08035", "scoring_system": "epss", "scoring_elements": "0.92122", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.08035", "scoring_system": "epss", "scoring_elements": "0.92129", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0498" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720", "reference_id": "790720", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790720" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0498" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hjsb-ex5e-8qfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61030?format=api", "vulnerability_id": "VCID-mdmd-uc64-2uev", "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n allowing attackers to cause unspecified impact.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0507.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0507.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0507", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.93568", "scoring_system": "epss", "scoring_elements": "0.99833", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.93568", "scoring_system": "epss", "scoring_elements": "0.99832", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.93568", "scoring_system": "epss", "scoring_elements": "0.99831", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0507" }, { "reference_url": "http://secunia.com/advisories/48589", "reference_id": "48589", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://secunia.com/advisories/48589" }, { "reference_url": "http://secunia.com/advisories/48692", "reference_id": "48692", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://secunia.com/advisories/48692" }, { "reference_url": "http://secunia.com/advisories/48915", "reference_id": "48915", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://secunia.com/advisories/48915" }, { "reference_url": "http://secunia.com/advisories/48948", "reference_id": "48948", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://secunia.com/advisories/48948" }, { "reference_url": "http://secunia.com/advisories/48950", "reference_id": "48950", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://secunia.com/advisories/48950" }, { "reference_url": "http://www.securityfocus.com/bid/52161", "reference_id": "52161", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://www.securityfocus.com/bid/52161" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994", "reference_id": "788994", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788994" }, { "reference_url": "http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx", "reference_id": "an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sandbox-breach-cve-2012-0507.aspx" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/18679.rb", "reference_id": "CVE-2012-0507;OSVDB-80724", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/remote/18679.rb" }, { "reference_url": "http://www.debian.org/security/2012/dsa-2420", "reference_id": "dsa-2420", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://www.debian.org/security/2012/dsa-2420" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html", "reference_id": "javacpufeb2012-366318.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2012-366318.html" }, { "reference_url": "http://marc.info/?l=bugtraq&m=133364885411663&w=2", "reference_id": "?l=bugtraq&m=133364885411663&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://marc.info/?l=bugtraq&m=133364885411663&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=133365109612558&w=2", "reference_id": "?l=bugtraq&m=133365109612558&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://marc.info/?l=bugtraq&m=133365109612558&w=2" }, { "reference_url": "http://marc.info/?l=bugtraq&m=133847939902305&w=2", "reference_id": "?l=bugtraq&m=133847939902305&w=2", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://marc.info/?l=bugtraq&m=133847939902305&w=2" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html", "reference_id": "msg00009.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html", "reference_id": "msg00010.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00010.html" }, { "reference_url": "http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/", "reference_id": "new-java-attack-rolled-into-exploit-packs", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://krebsonsecurity.com/2012/03/new-java-attack-rolled-into-exploit-packs/" }, { "reference_url": "http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3", "reference_id": "PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://weblog.ikvm.net/PermaLink.aspx?guid=cd48169a-9405-4f63-9087-798c4a1866d3" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html", "reference_id": "RHSA-2012-0508.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0508.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html", "reference_id": "RHSA-2012-0514.html", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:54:57Z/" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0514.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0507" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "8.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mdmd-uc64-2uev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56303?format=api", "vulnerability_id": "VCID-muqs-gqsv-wuev", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0506.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0506.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0506", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.80962", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.80971", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.80994", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.80993", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.81021", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.81028", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.81045", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.81032", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.81024", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01485", "scoring_system": "epss", "scoring_elements": "0.81062", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0506" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300", "reference_id": "789300", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789300" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0702", "reference_id": "RHSA-2012:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1080", "reference_id": "RHSA-2012:1080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0506" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-muqs-gqsv-wuev" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56301?format=api", "vulnerability_id": "VCID-nyf1-5f2w-q3g1", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0503.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0503.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0503", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83519", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83531", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83545", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83547", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83571", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.8358", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83595", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83589", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83585", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01983", "scoring_system": "epss", "scoring_elements": "0.83619", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0503" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976", "reference_id": "788976", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=788976" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0508", "reference_id": "RHSA-2012:0508", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0508" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0702", "reference_id": "RHSA-2012:0702", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0702" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1080", "reference_id": "RHSA-2012:1080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0503" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nyf1-5f2w-q3g1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56298?format=api", "vulnerability_id": "VCID-v2e9-45y6-8qd4", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0497.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0497.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0497", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89492", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89496", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89507", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89524", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89527", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89535", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89532", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89528", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0484", "scoring_system": "epss", "scoring_elements": "0.89541", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0497" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301", "reference_id": "789301", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=789301" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0135", "reference_id": "RHSA-2012:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0322", "reference_id": "RHSA-2012:0322", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0322" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" }, { "reference_url": "https://usn.ubuntu.com/1373-1/", "reference_id": "USN-1373-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-1/" }, { "reference_url": "https://usn.ubuntu.com/1373-2/", "reference_id": "USN-1373-2", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1373-2/" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0497" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v2e9-45y6-8qd4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61028?format=api", "vulnerability_id": "VCID-wxtc-4524-pqb7", "summary": "Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n allowing attackers to cause unspecified impact.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0500.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0500.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0500", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.98854", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.98856", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.98857", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.98859", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.98861", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.9886", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.98863", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.98864", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.74853", "scoring_system": "epss", "scoring_elements": "0.98867", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0500" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724", "reference_id": "790724", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=790724" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18520.rb", "reference_id": "CVE-2012-0500;OSVDB-79227", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/remote/18520.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201401-30", "reference_id": "GLSA-201401-30", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201401-30" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0139", "reference_id": "RHSA-2012:0139", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0139" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0514", "reference_id": "RHSA-2012:0514", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:0514" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1455", "reference_id": "RHSA-2013:1455", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:1455" } ], "fixed_packages": [], "aliases": [ "CVE-2012-0500" ], "risk_score": 1.4, "exploitability": "2.0", "weighted_severity": "0.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wxtc-4524-pqb7" } ], "fixing_vulnerabilities": [], "risk_score": "10.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.10.1-1jpp.1%3Farch=el5" }