Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/925160?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "type": "deb", "namespace": "debian", "name": "icedtea-web", "version": "1.8.8-4", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86698?format=api", "vulnerability_id": "VCID-34vp-a5jh-v7b4", "summary": "icedtea-web: GIFAR issue", "references": [ { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS" }, { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/cb58b31c450e", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/cb58b31c450e" }, { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/19f5282f53e8", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/19f5282f53e8" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" }, { "reference_url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html" }, { "reference_url": "http://osvdb.org/92544", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/92544" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0753.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1927.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1927.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1927", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.84462", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.84497", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.84499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.8452", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.84526", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.84544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.84539", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.84535", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02232", "scoring_system": "epss", "scoring_elements": "0.84478", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85336", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85365", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85364", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85356", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85337", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0249", "scoring_system": "epss", "scoring_elements": "0.85334", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1927" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1927" }, { "reference_url": "http://secunia.com/advisories/53109", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53109" }, { "reference_url": "http://secunia.com/advisories/53117", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53117" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83640", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83640" }, { "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:146" }, { "reference_url": "http://www.securityfocus.com/bid/59286", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/59286" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1804-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1804-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=884705", "reference_id": "884705", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=884705" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1927", "reference_id": "CVE-2013-1927", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0753", "reference_id": "RHSA-2013:0753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0753" }, { "reference_url": "https://usn.ubuntu.com/1804-1/", "reference_id": "USN-1804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925166?format=api", "purl": "pkg:deb/debian/icedtea-web@1.3.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-1927" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-34vp-a5jh-v7b4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86699?format=api", "vulnerability_id": "VCID-7kjg-u6mz-nycc", "summary": "icedtea-web: class loader sharing for applets with same codebase paths", "references": [ { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/file/icedtea-web-1.2.3/NEWS" }, { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/34b6f60ae586", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/34b6f60ae586" }, { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/25dd7c7ac39c", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/25dd7c7ac39c" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00020.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00013.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-04/msg00106.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00003.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-05/msg00032.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00030.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00034.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-06/msg00101.html" }, { "reference_url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-April/022790.html" }, { "reference_url": "http://osvdb.org/92543", "reference_id": "", "reference_type": "", "scores": [], "url": "http://osvdb.org/92543" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2013-0753.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2013-0753.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1926.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-1926.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1926", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75482", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75347", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.7535", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75382", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75361", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75404", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75414", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75434", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75412", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75443", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75448", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75438", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75473", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00883", "scoring_system": "epss", "scoring_elements": "0.75477", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-1926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1926" }, { "reference_url": "http://secunia.com/advisories/53109", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53109" }, { "reference_url": "http://secunia.com/advisories/53117", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/53117" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83642", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/83642" }, { "reference_url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123", "reference_id": "", "reference_type": "", "scores": [], "url": "https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0123" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:146", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:146" }, { "reference_url": "http://www.securityfocus.com/bid/59281", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/59281" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1804-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1804-1" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=916774", "reference_id": "916774", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=916774" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.0.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.7:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1926", "reference_id": "CVE-2013-1926", "reference_type": "", "scores": [ { "value": "5.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:N" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-1926" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:0753", "reference_id": "RHSA-2013:0753", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2013:0753" }, { "reference_url": "https://usn.ubuntu.com/1804-1/", "reference_id": "USN-1804-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1804-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925166?format=api", "purl": "pkg:deb/debian/icedtea-web@1.3.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-1926" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7kjg-u6mz-nycc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85532?format=api", "vulnerability_id": "VCID-86kr-2g2x-pbek", "summary": "icedtea-web: unexpected permanent authorization of unsigned applets", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5234.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5234.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5234", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75903", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75906", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75938", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75917", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.7595", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75964", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75988", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75965", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75958", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75996", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75999", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.75983", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76021", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76031", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0092", "scoring_system": "epss", "scoring_elements": "0.76042", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5234" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5234" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233667", "reference_id": "1233667", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233667" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798467", "reference_id": "798467", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798467" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0778", "reference_id": "RHSA-2016:0778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0778" }, { "reference_url": "https://usn.ubuntu.com/2817-1/", "reference_id": "USN-2817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925168?format=api", "purl": "pkg:deb/debian/icedtea-web@1.6.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.6.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-5234" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-86kr-2g2x-pbek" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/54369?format=api", "vulnerability_id": "VCID-87f2-a1zb-7qgp", "summary": "heap-based buffer overflow", "references": [ { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.1/file/d759ec560073/NEWS", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.1/file/d759ec560073/NEWS" }, { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/596a718be03f", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.2/rev/596a718be03f" }, { "reference_url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/e7970f3da5fe", "reference_id": "", "reference_type": "", "scores": [], "url": "http://icedtea.classpath.org/hg/release/icedtea-web-1.3/rev/e7970f3da5fe" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00019.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2012-11/msg00040.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00065.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00071.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-updates/2013-09/msg00073.html" }, { "reference_url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-November/020775.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-November/020775.html" }, { "reference_url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-September/024750.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2013-September/024750.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1434.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2012-1434.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4540.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4540.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4540", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81111", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.80975", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.80984", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81007", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81006", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81034", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81041", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81058", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81044", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81037", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81074", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81076", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81072", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81095", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01487", "scoring_system": "epss", "scoring_elements": "0.81103", "published_at": "2026-04-26T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-4540" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4540" }, { "reference_url": "http://secunia.com/advisories/51206", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51206" }, { "reference_url": "http://secunia.com/advisories/51220", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51220" }, { "reference_url": "http://secunia.com/advisories/51374", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/51374" }, { "reference_url": "http://security.gentoo.org/glsa/glsa-201406-32.xml", "reference_id": "", "reference_type": "", "scores": [], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79894", "reference_id": "", "reference_type": "", "scores": [], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79894" }, { "reference_url": "http://www.debian.org/security/2013/dsa-2768", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.debian.org/security/2013/dsa-2768" }, { "reference_url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:171", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:171" }, { "reference_url": "http://www.openwall.com/lists/oss-security/2012/11/07/5", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.openwall.com/lists/oss-security/2012/11/07/5" }, { "reference_url": "http://www.securityfocus.com/bid/56434", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/56434" }, { "reference_url": "http://www.securityfocus.com/bid/62426", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/62426" }, { "reference_url": "http://www.securitytracker.com/id?1027738", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securitytracker.com/id?1027738" }, { "reference_url": "http://www.ubuntu.com/usn/USN-1625-1", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.ubuntu.com/usn/USN-1625-1" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692608", "reference_id": "692608", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=692608" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=869040", "reference_id": "869040", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=869040" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.1.6:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:icedtea-web:1.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4540", "reference_id": "CVE-2012-4540", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:P/I:P/A:P" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-4540" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1434", "reference_id": "RHSA-2012:1434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1434" }, { "reference_url": "https://usn.ubuntu.com/1625-1/", "reference_id": "USN-1625-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1625-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925165?format=api", "purl": "pkg:deb/debian/icedtea-web@1.3.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-4540" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "6.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-87f2-a1zb-7qgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/85533?format=api", "vulnerability_id": "VCID-92b2-qrv6-vyh3", "summary": "icedtea-web: applet origin spoofing", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5235.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-5235.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5235", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76145", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.7615", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76182", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76162", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76195", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76208", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76233", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76209", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76207", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76248", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76253", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76235", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76273", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76282", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00938", "scoring_system": "epss", "scoring_elements": "0.76295", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-5235" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5235" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233697", "reference_id": "1233697", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1233697" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798467", "reference_id": "798467", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798467" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2016:0778", "reference_id": "RHSA-2016:0778", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2016:0778" }, { "reference_url": "https://usn.ubuntu.com/2817-1/", "reference_id": "USN-2817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925168?format=api", "purl": "pkg:deb/debian/icedtea-web@1.6.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.6.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2015-5235" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-92b2-qrv6-vyh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87220?format=api", "vulnerability_id": "VCID-daey-rnba-1ue9", "summary": "IcedTea-Web: second-level domain subdomains and suffix domain SOP bypass", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3377.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-3377.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3377", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76582", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76585", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76614", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76594", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76626", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76638", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76664", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76644", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76635", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76676", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76681", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76669", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.767", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76707", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00971", "scoring_system": "epss", "scoring_elements": "0.76719", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-3377" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3377" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=742515", "reference_id": "742515", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=742515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1441", "reference_id": "RHSA-2011:1441", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1441" }, { "reference_url": "https://usn.ubuntu.com/1263-1/", "reference_id": "USN-1263-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1263-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925163?format=api", "purl": "pkg:deb/debian/icedtea-web@1.1.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.1.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-3377" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-daey-rnba-1ue9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86385?format=api", "vulnerability_id": "VCID-efq2-j3vx-y3g5", "summary": "icedtea-web: insecure temporary file use flaw in LiveConnect implementation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6493.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-6493.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6493", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18667", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18804", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18857", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18578", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18713", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18718", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1867", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.1862", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18565", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18574", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18594", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18487", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18473", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18431", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2013-6493" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6493", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6493" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010958", "reference_id": "1010958", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1010958" }, { "reference_url": "https://usn.ubuntu.com/2131-1/", "reference_id": "USN-2131-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2131-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925167?format=api", "purl": "pkg:deb/debian/icedtea-web@1.4.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.4.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2013-6493" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-efq2-j3vx-y3g5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87319?format=api", "vulnerability_id": "VCID-h1z1-778q-13g1", "summary": "icedtea-web: home directory path disclosure to untrusted applications", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2513.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2513.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2513", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.6588", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65921", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65951", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65918", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65969", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65981", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65999", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65986", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65956", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65991", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66005", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.65992", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66012", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66024", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.005", "scoring_system": "epss", "scoring_elements": "0.66022", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2513" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2513", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2513" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=718164", "reference_id": "718164", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1100", "reference_id": "RHSA-2011:1100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1100" }, { "reference_url": "https://usn.ubuntu.com/1178-1/", "reference_id": "USN-1178-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1178-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925158?format=api", "purl": "pkg:deb/debian/icedtea-web@1.1.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.1.2-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-2513" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-h1z1-778q-13g1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49693?format=api", "vulnerability_id": "VCID-hqcx-4f8z-2fhe", "summary": "Multiple vulnerabilities have been found in IcedTeaWeb, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10181.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10181.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10181", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60464", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60607", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60606", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60618", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.6054", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60566", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60535", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60584", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.606", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60624", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60609", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60588", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60629", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60634", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00398", "scoring_system": "epss", "scoring_elements": "0.60622", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10181" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10181", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10181" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725928", "reference_id": "1725928", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1725928" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319", "reference_id": "934319", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319" }, { "reference_url": "https://security.archlinux.org/AVG-1017", "reference_id": "AVG-1017", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1017" }, { "reference_url": "https://security.gentoo.org/glsa/202107-51", "reference_id": "GLSA-202107-51", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-51" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2003", "reference_id": "RHSA-2019:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2004", "reference_id": "RHSA-2019:2004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2004" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925169?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10181" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hqcx-4f8z-2fhe" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/87320?format=api", "vulnerability_id": "VCID-ke24-ysxj-xbes", "summary": "icedtea-web: Java Web Start security warning dialog manipulation", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2514.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-2514.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2514", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75269", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75272", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75305", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75326", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75337", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75358", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75336", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75325", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75365", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75371", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75361", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75396", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.754", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.00878", "scoring_system": "epss", "scoring_elements": "0.75405", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2011-2514" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2514", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2514" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=718170", "reference_id": "718170", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2011:1100", "reference_id": "RHSA-2011:1100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2011:1100" }, { "reference_url": "https://usn.ubuntu.com/1178-1/", "reference_id": "USN-1178-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1178-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925162?format=api", "purl": "pkg:deb/debian/icedtea-web@1.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2011-2514" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ke24-ysxj-xbes" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/49694?format=api", "vulnerability_id": "VCID-n151-1sjk-eudx", "summary": "Multiple vulnerabilities have been found in IcedTeaWeb, the worst\n of which could result in the arbitrary execution of code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10185.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10185.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10185", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01854", "scoring_system": "epss", "scoring_elements": "0.8309", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01854", "scoring_system": "epss", "scoring_elements": "0.83052", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01854", "scoring_system": "epss", "scoring_elements": "0.83075", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01854", "scoring_system": "epss", "scoring_elements": "0.83083", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.8332", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83335", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83369", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83384", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83378", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83373", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83409", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.8341", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83305", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01926", "scoring_system": "epss", "scoring_elements": "0.83336", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10185" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724989", "reference_id": "1724989", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724989" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319", "reference_id": "934319", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319" }, { "reference_url": "https://security.archlinux.org/AVG-1017", "reference_id": "AVG-1017", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1017" }, { "reference_url": "https://security.gentoo.org/glsa/202107-51", "reference_id": "GLSA-202107-51", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202107-51" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2003", "reference_id": "RHSA-2019:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2004", "reference_id": "RHSA-2019:2004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2004" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925169?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10185" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n151-1sjk-eudx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56316?format=api", "vulnerability_id": "VCID-tc7a-29c8-b3dx", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3423.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3423.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3423", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.85998", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86009", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86026", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86055", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86069", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86067", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86062", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.8608", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86085", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86077", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86097", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86106", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.0278", "scoring_system": "epss", "scoring_elements": "0.86107", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3423" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3423" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=841345", "reference_id": "841345", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=841345" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1132", "reference_id": "RHSA-2012:1132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1132" }, { "reference_url": "https://usn.ubuntu.com/1521-1/", "reference_id": "USN-1521-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1521-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925164?format=api", "purl": "pkg:deb/debian/icedtea-web@1.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3423" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tc7a-29c8-b3dx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/82313?format=api", "vulnerability_id": "VCID-u5rh-7y7v-8yfm", "summary": "icedtea-web: path traversal while processing <jar/> elements of JNLP files results in arbitrary file overwrite", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10182.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.2", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-10182.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10182", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77642", "published_at": "2026-04-29T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77587", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.7762", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01052", "scoring_system": "epss", "scoring_elements": "0.77626", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80655", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80672", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80701", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80711", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80727", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80713", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80705", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80741", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80647", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80677", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2019-10182" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10182", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10182" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724958", "reference_id": "1724958", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1724958" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319", "reference_id": "934319", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=934319" }, { "reference_url": "https://security.archlinux.org/AVG-1017", "reference_id": "AVG-1017", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-1017" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2003", "reference_id": "RHSA-2019:2003", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2019:2004", "reference_id": "RHSA-2019:2004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2019:2004" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925169?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2019-10182" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u5rh-7y7v-8yfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/56315?format=api", "vulnerability_id": "VCID-wkkv-61uc-jufm", "summary": "Multiple vulnerabilities have been found in the IcedTea JDK, the\n worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3422.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3422.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3422", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78638", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78644", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78674", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78655", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78681", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78687", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78712", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78693", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78686", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78714", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78709", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78737", "published_at": "2026-04-24T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78745", "published_at": "2026-04-26T12:55:00Z" }, { "value": "0.01173", "scoring_system": "epss", "scoring_elements": "0.78762", "published_at": "2026-04-29T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-3422" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3422" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=840592", "reference_id": "840592", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=840592" }, { "reference_url": "https://security.gentoo.org/glsa/201406-32", "reference_id": "GLSA-201406-32", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201406-32" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1132", "reference_id": "RHSA-2012:1132", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2012:1132" }, { "reference_url": "https://usn.ubuntu.com/1521-1/", "reference_id": "USN-1521-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/1521-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/925164?format=api", "purl": "pkg:deb/debian/icedtea-web@1.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925159?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925157?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925161?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-3?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-3%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/925160?format=api", "purl": "pkg:deb/debian/icedtea-web@1.8.8-4?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" } ], "aliases": [ "CVE-2012-3422" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wkkv-61uc-jufm" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/icedtea-web@1.8.8-4%3Fdistro=trixie" }