Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/933675?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "type": "deb", "namespace": "debian", "name": "openjdk-8", "version": "8u40~b22-1", "qualifiers": { "distro": "sid" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "8u45-b14-1", "latest_non_vulnerable_version": "8u482-ga-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34714?format=api", "vulnerability_id": "VCID-42p6-1tu2-pybt", "summary": "Multiple vulnerabilities have been found in Oracle's JRE and JDK\n software suites allowing remote attackers to remotely execute arbitrary\n code, obtain information, and cause Denial of Service.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0437.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0437.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0437", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79095", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79101", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79128", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79113", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79138", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79146", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.7917", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79155", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79145", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01228", "scoring_system": "epss", "scoring_elements": "0.79172", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0437" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183670", "reference_id": "1183670", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183670" }, { "reference_url": "https://security.gentoo.org/glsa/201603-11", "reference_id": "GLSA-201603-11", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-11" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2015-0437" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-42p6-1tu2-pybt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31271?format=api", "vulnerability_id": "VCID-753c-x7gd-37dd", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6593.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6593.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98656", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98657", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.9866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98663", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98664", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98665", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98667", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98669", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.69879", "scoring_system": "epss", "scoring_elements": "0.98672", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183049", "reference_id": "1183049", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183049" }, { "reference_url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/38641.rb", "reference_id": "CVE-2014-6593;OSVDB-117238", "reference_type": "exploit", "scores": [], "url": "https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/multiple/webapps/38641.rb" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2014-6593" ], "risk_score": 1.2, "exploitability": "2.0", "weighted_severity": "0.6", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-753c-x7gd-37dd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40168?format=api", "vulnerability_id": "VCID-8vgw-tt9y-rubw", "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n allowing both local and remote attackers to compromise various Java\n components.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0421.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0421.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0421", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30731", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30858", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30904", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30724", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30782", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30814", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30815", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30771", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30726", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.3075", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0421" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184276", "reference_id": "1184276", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1184276" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2015-0421" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8vgw-tt9y-rubw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40104?format=api", "vulnerability_id": "VCID-98te-nhbx-qbb9", "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n allowing both local and remote attackers to compromise various Java\n components.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6549.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6549.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6549", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76868", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76875", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76905", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76887", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76919", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76929", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76957", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76937", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76932", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00995", "scoring_system": "epss", "scoring_elements": "0.76974", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6549" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183660", "reference_id": "1183660", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183660" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2014-6549" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-98te-nhbx-qbb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31273?format=api", "vulnerability_id": "VCID-9xy4-pu4v-xuff", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0383.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0383.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24322", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2445", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24483", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24265", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24332", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24376", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24393", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.2435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24293", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24311", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1123870", "reference_id": "1123870", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1123870" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2015-0383" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9xy4-pu4v-xuff" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31278?format=api", "vulnerability_id": "VCID-ccht-tkj5-jfez", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0408.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0408.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91853", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91861", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91868", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91875", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91887", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91893", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91892", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.07652", "scoring_system": "epss", "scoring_elements": "0.91911", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183023", "reference_id": "1183023", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183023" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2015-0408" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ccht-tkj5-jfez" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31268?format=api", "vulnerability_id": "VCID-dr2n-9pz1-gfd5", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6585.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6585.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85492", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85504", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85521", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85525", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85545", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85556", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.8557", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85567", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85563", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85586", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183645", "reference_id": "1183645", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183645" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776264", "reference_id": "776264", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=776264" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-3/", "reference_id": "USN-2522-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2014-6585" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dr2n-9pz1-gfd5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31277?format=api", "vulnerability_id": "VCID-edhe-xduh-8fb9", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0407.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0407.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86255", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86282", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86283", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86301", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86311", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86325", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86323", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86319", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02893", "scoring_system": "epss", "scoring_elements": "0.86334", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183043", "reference_id": "1183043", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183043" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2015-0407" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-edhe-xduh-8fb9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/40158?format=api", "vulnerability_id": "VCID-f46c-z1vt-jkae", "summary": "Multiple vulnerabilities have been found in Oracle JRE/JDK,\n allowing both local and remote attackers to compromise various Java\n components.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0410.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0410.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90143", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90146", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90157", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90184", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90192", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90186", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.05455", "scoring_system": "epss", "scoring_elements": "0.90204", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183044", "reference_id": "1183044", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183044" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2015-0410" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-f46c-z1vt-jkae" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31270?format=api", "vulnerability_id": "VCID-nyhx-9tes-9ygr", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6591.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6591.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84697", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84712", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84733", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84755", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84762", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.8478", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84775", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.8477", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02311", "scoring_system": "epss", "scoring_elements": "0.84791", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7923" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7926" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7940" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9654" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183646", "reference_id": "1183646", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183646" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884", "reference_id": "775884", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=775884" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-1/", "reference_id": "USN-2522-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-1/" }, { "reference_url": "https://usn.ubuntu.com/2522-3/", "reference_id": "USN-2522-3", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2522-3/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2014-6591" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nyhx-9tes-9ygr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31272?format=api", "vulnerability_id": "VCID-vath-gcc5-zybq", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6601.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6601.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.13255", "scoring_system": "epss", "scoring_elements": "0.94112", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.13255", "scoring_system": "epss", "scoring_elements": "0.94122", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.13255", "scoring_system": "epss", "scoring_elements": "0.94134", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.13255", "scoring_system": "epss", "scoring_elements": "0.94137", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.13255", "scoring_system": "epss", "scoring_elements": "0.94146", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.13255", "scoring_system": "epss", "scoring_elements": "0.94149", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.13255", "scoring_system": "epss", "scoring_elements": "0.94154", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.13255", "scoring_system": "epss", "scoring_elements": "0.9417", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183020", "reference_id": "1183020", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183020" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2014-6601" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.1", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vath-gcc5-zybq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31269?format=api", "vulnerability_id": "VCID-vuvu-hscm-guh1", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6587.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-6587.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34085", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34421", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34449", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34315", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34358", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34387", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.3439", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.3435", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34327", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34362", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183715", "reference_id": "1183715", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183715" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2014-6587" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vuvu-hscm-guh1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31275?format=api", "vulnerability_id": "VCID-wy3y-qjfn-xudt", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0395.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0395.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.95398", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.95407", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.95413", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.95417", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.95423", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.95426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.9543", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.95432", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.19708", "scoring_system": "epss", "scoring_elements": "0.9544", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183031", "reference_id": "1183031", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183031" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0136", "reference_id": "RHSA-2015:0136", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0136" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2015-0395" ], "risk_score": 0.1, "exploitability": "0.5", "weighted_severity": "0.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wy3y-qjfn-xudt" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/31279?format=api", "vulnerability_id": "VCID-xgvx-tpbg-73hf", "summary": "Multiple vulnerabilities have been found in IcedTea allowing remote\n attackers to affect confidentiality, integrity, and availability through\n various vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0412.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2015-0412.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80695", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80704", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80725", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80722", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.8075", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80759", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80775", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.8076", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80751", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01447", "scoring_system": "epss", "scoring_elements": "0.80788", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2015-0412" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6585" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6587" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6591" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6593" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6601" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0383" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0395" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0407" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0408" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0410" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0412" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183021", "reference_id": "1183021", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1183021" }, { "reference_url": "https://security.gentoo.org/glsa/201507-14", "reference_id": "GLSA-201507-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201507-14" }, { "reference_url": "https://security.gentoo.org/glsa/201603-14", "reference_id": "GLSA-201603-14", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/201603-14" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0067", "reference_id": "RHSA-2015:0067", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0067" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0068", "reference_id": "RHSA-2015:0068", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0068" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0069", "reference_id": "RHSA-2015:0069", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0069" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0079", "reference_id": "RHSA-2015:0079", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0079" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0080", "reference_id": "RHSA-2015:0080", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0080" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0085", "reference_id": "RHSA-2015:0085", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0085" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0086", "reference_id": "RHSA-2015:0086", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0133", "reference_id": "RHSA-2015:0133", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0133" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0134", "reference_id": "RHSA-2015:0134", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0134" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0135", "reference_id": "RHSA-2015:0135", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0135" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0263", "reference_id": "RHSA-2015:0263", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" }, { "reference_url": "https://usn.ubuntu.com/2486-1/", "reference_id": "USN-2486-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2486-1/" }, { "reference_url": "https://usn.ubuntu.com/2487-1/", "reference_id": "USN-2487-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/2487-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/933675?format=api", "purl": "pkg:deb/debian/openjdk-8@8u40~b22-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }, { "url": "http://public2.vulnerablecode.io/api/packages/933671?format=api", "purl": "pkg:deb/debian/openjdk-8@8u482-ga-1?distro=sid", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u482-ga-1%3Fdistro=sid" } ], "aliases": [ "CVE-2015-0412" ], "risk_score": null, "exploitability": "0.5", "weighted_severity": "0.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xgvx-tpbg-73hf" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/openjdk-8@8u40~b22-1%3Fdistro=sid" }