Vulnerability Instance
Lookup for vulnerabilities affecting packages.
GET /api/vulnerabilities/86059?format=api
{ "url": "http://public2.vulnerablecode.io/api/vulnerabilities/86059?format=api", "vulnerability_id": "VCID-keub-rq9p-vqhh", "summary": "JDK: privilege escalation via shared class cache", "aliases": [ { "alias": "CVE-2014-3065" } ], "fixed_packages": [], "affected_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/120677?format=api", "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.8-1jpp.1?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.8-1jpp.1%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/120682?format=api", "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.8-1jpp.1?arch=el6_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.8-1jpp.1%3Farch=el6_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/120681?format=api", "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.2-1jpp.1?arch=el6_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13cc-fgdq-jygw" }, { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-9yus-96z5-dub9" }, { "vulnerability": "VCID-bmb1-ekh1-9fc3" }, { "vulnerability": "VCID-gst6-e8vf-jff8" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-kbur-d5ax-jqgk" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-kwca-ph6k-wqar" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-uhsa-uttv-mfes" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.2-1jpp.1%3Farch=el6_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/120680?format=api", "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.2-1jpp.1?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13cc-fgdq-jygw" }, { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-9yus-96z5-dub9" }, { "vulnerability": "VCID-bmb1-ekh1-9fc3" }, { "vulnerability": "VCID-gst6-e8vf-jff8" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-kbur-d5ax-jqgk" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-kwca-ph6k-wqar" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-uhsa-uttv-mfes" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.2-1jpp.1%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/120359?format=api", "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.3-1jpp.1?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13cc-fgdq-jygw" }, { "vulnerability": "VCID-4nna-17uk-13a1" }, { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-753c-x7gd-37dd" }, { "vulnerability": "VCID-8muz-j586-jubr" }, { "vulnerability": "VCID-927f-vkza-gfck" }, { "vulnerability": "VCID-9yus-96z5-dub9" }, { "vulnerability": "VCID-aefw-31dp-ufg8" }, { "vulnerability": "VCID-bmb1-ekh1-9fc3" }, { "vulnerability": "VCID-ccht-tkj5-jfez" }, { "vulnerability": "VCID-cjda-feye-v3fd" }, { "vulnerability": "VCID-dr2n-9pz1-gfd5" }, { "vulnerability": "VCID-edhe-xduh-8fb9" }, { "vulnerability": "VCID-f34q-etf1-7qdp" }, { "vulnerability": "VCID-f46c-z1vt-jkae" }, { "vulnerability": "VCID-fass-3uxv-rbdc" }, { "vulnerability": "VCID-fwvc-5k33-fkbm" }, { "vulnerability": "VCID-gst6-e8vf-jff8" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-jqmy-2cq5-v7gf" }, { "vulnerability": "VCID-kbur-d5ax-jqgk" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-kwca-ph6k-wqar" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-ntmk-ub1c-5ygz" }, { "vulnerability": "VCID-nyhx-9tes-9ygr" }, { "vulnerability": "VCID-pz85-gym7-wub1" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-uhsa-uttv-mfes" }, { "vulnerability": "VCID-v6xh-u5b3-zffs" }, { "vulnerability": "VCID-v8dj-c1hh-wbe8" }, { "vulnerability": "VCID-vuvu-hscm-guh1" }, { "vulnerability": "VCID-wgn7-zgah-qkg6" }, { "vulnerability": "VCID-wy3y-qjfn-xudt" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-xgvx-tpbg-73hf" }, { "vulnerability": "VCID-xry5-hzk4-b3b8" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-ibm@1:1.6.0.16.3-1jpp.1%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/120684?format=api", "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.0-1jpp.1?arch=el6_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13cc-fgdq-jygw" }, { "vulnerability": "VCID-1e6n-3kbt-xucw" }, { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-9yus-96z5-dub9" }, { "vulnerability": "VCID-bmb1-ekh1-9fc3" }, { "vulnerability": "VCID-gst6-e8vf-jff8" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-kbur-d5ax-jqgk" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-kwca-ph6k-wqar" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-qr8w-umju-9yfd" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-ue2f-emuu-43af" }, { "vulnerability": "VCID-uhsa-uttv-mfes" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.0-1jpp.1%3Farch=el6_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/120678?format=api", "purl": "pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.0-1jpp.1?arch=el5", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13cc-fgdq-jygw" }, { "vulnerability": "VCID-1e6n-3kbt-xucw" }, { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-9yus-96z5-dub9" }, { "vulnerability": "VCID-bmb1-ekh1-9fc3" }, { "vulnerability": "VCID-gst6-e8vf-jff8" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-kbur-d5ax-jqgk" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-kwca-ph6k-wqar" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-qr8w-umju-9yfd" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-ue2f-emuu-43af" }, { "vulnerability": "VCID-uhsa-uttv-mfes" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.8.0-1jpp.1%3Farch=el5" }, { "url": "http://public2.vulnerablecode.io/api/packages/120679?format=api", "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.2.0-1jpp.3?arch=el6_6", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13cc-fgdq-jygw" }, { "vulnerability": "VCID-1e6n-3kbt-xucw" }, { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-9yus-96z5-dub9" }, { "vulnerability": "VCID-bmb1-ekh1-9fc3" }, { "vulnerability": "VCID-gst6-e8vf-jff8" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-kbur-d5ax-jqgk" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-kwca-ph6k-wqar" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-qr8w-umju-9yfd" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-ue2f-emuu-43af" }, { "vulnerability": "VCID-uhsa-uttv-mfes" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.2.0-1jpp.3%3Farch=el6_6" }, { "url": "http://public2.vulnerablecode.io/api/packages/120683?format=api", "purl": "pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.2.0-1jpp.3?arch=el7_0", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-13cc-fgdq-jygw" }, { "vulnerability": "VCID-1e6n-3kbt-xucw" }, { "vulnerability": "VCID-56dc-jab3-jubm" }, { "vulnerability": "VCID-9yus-96z5-dub9" }, { "vulnerability": "VCID-bmb1-ekh1-9fc3" }, { "vulnerability": "VCID-gst6-e8vf-jff8" }, { "vulnerability": "VCID-hwk7-33xw-pqhy" }, { "vulnerability": "VCID-kbur-d5ax-jqgk" }, { "vulnerability": "VCID-kdct-g1je-hkc5" }, { "vulnerability": "VCID-keub-rq9p-vqhh" }, { "vulnerability": "VCID-kwca-ph6k-wqar" }, { "vulnerability": "VCID-mjry-sm7c-pubz" }, { "vulnerability": "VCID-n9gc-93v2-ukdm" }, { "vulnerability": "VCID-qr8w-umju-9yfd" }, { "vulnerability": "VCID-t4vm-9pr1-dbav" }, { "vulnerability": "VCID-ue2f-emuu-43af" }, { "vulnerability": "VCID-uhsa-uttv-mfes" }, { "vulnerability": "VCID-xap5-djda-2uem" }, { "vulnerability": "VCID-ydpy-su7k-ffe9" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.1-ibm@1:1.7.1.2.0-1jpp.3%3Farch=el7_0" } ], "references": [ { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-11/msg00021.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2014-12/msg00002.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00026.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00027.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00033.html" }, { "reference_url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00036.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1876.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1877.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1880.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1881.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2014-1882.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html", "reference_id": "", "reference_type": "", "scores": [], "url": "http://rhn.redhat.com/errata/RHSA-2015-0264.html" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3065.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-3065.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3065", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26522", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26622", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26669", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2671", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26496", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26564", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26613", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26618", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26572", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26515", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2014-3065" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66044", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66044" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66045", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IV66045" }, { "reference_url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21688283" }, { "reference_url": "http://www.securityfocus.com/bid/71147", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/71147" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162554", "reference_id": "1162554", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162554" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.3:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.14.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.5.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3065", "reference_id": "CVE-2014-3065", "reference_type": "", "scores": [ { "value": "6.9", "scoring_system": "cvssv2", "scoring_elements": "AV:L/AC:M/Au:N/C:C/I:C/A:C" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1876", "reference_id": "RHSA-2014:1876", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1876" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1877", "reference_id": "RHSA-2014:1877", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1877" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1880", "reference_id": "RHSA-2014:1880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1881", "reference_id": "RHSA-2014:1881", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1881" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:1882", "reference_id": "RHSA-2014:1882", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2014:1882" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2015:0264", "reference_id": "RHSA-2015:0264", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2015:0264" } ], "weaknesses": [ { "cwe_id": 94, "name": "Improper Control of Generation of Code ('Code Injection')", "description": "The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment." } ], "exploits": [], "severity_range_score": "6.9 - 6.9", "exploitability": "0.5", "weighted_severity": "6.2", "risk_score": 3.1, "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-keub-rq9p-vqhh" }