{"url":"http://public2.vulnerablecode.io/api/packages/122935?format=json","purl":"pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.5-1jpp.1?arch=el6_5","type":"rpm","namespace":"redhat","name":"java-1.5.0-ibm","version":"1:1.5.0.16.5-1jpp.1","qualifiers":{"arch":"el6_5"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61161?format=json","vulnerability_id":"VCID-1ts5-h2ey-uqa7","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0417.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0417.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0417","reference_id":"","reference_type":"","scores":[{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92665","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92672","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92687","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92691","published_at":"2026-04-09T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92697","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92709","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92714","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92717","published_at":"2026-04-24T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92718","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92712","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09186","scoring_system":"epss","scoring_elements":"0.92721","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0417"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053501","reference_id":"1053501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053501"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"}],"fixed_packages":[],"aliases":["CVE-2014-0417"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1ts5-h2ey-uqa7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61146?format=json","vulnerability_id":"VCID-4x5f-5aph-tudz","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5907.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5907.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5907","reference_id":"","reference_type":"","scores":[{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94886","published_at":"2026-04-01T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94895","published_at":"2026-04-02T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94898","published_at":"2026-04-04T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.949","published_at":"2026-04-07T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94909","published_at":"2026-04-08T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94913","published_at":"2026-04-09T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94918","published_at":"2026-04-11T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.9492","published_at":"2026-04-12T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94922","published_at":"2026-04-13T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.9493","published_at":"2026-04-16T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94933","published_at":"2026-04-18T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94938","published_at":"2026-04-26T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94937","published_at":"2026-04-29T12:55:00Z"},{"value":"0.16596","scoring_system":"epss","scoring_elements":"0.94944","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5907"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1052915","reference_id":"1052915","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1052915"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5907"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4x5f-5aph-tudz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61148?format=json","vulnerability_id":"VCID-56n7-82vg-jfan","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0368.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0368","reference_id":"","reference_type":"","scores":[{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.8464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84737","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84752","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0368"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1052919","reference_id":"1052919","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1052919"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0368"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-56n7-82vg-jfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61158?format=json","vulnerability_id":"VCID-5q76-be54-3fau","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0411.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0411.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0411","reference_id":"","reference_type":"","scores":[{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80168","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80175","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80184","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80212","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80221","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.8024","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80226","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80249","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.8025","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80254","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80279","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80286","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80303","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01371","scoring_system":"epss","scoring_elements":"0.80317","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0411"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053010","reference_id":"1053010","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053010"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0411"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5q76-be54-3fau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61151?format=json","vulnerability_id":"VCID-avtm-kfue-wyed","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0376.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0376.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0376","reference_id":"","reference_type":"","scores":[{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81497","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81509","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81531","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81529","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81557","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81562","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81582","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81569","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.816","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81601","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81606","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81628","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.8164","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01578","scoring_system":"epss","scoring_elements":"0.81656","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0376"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051923","reference_id":"1051923","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051923"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0376"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-avtm-kfue-wyed"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61149?format=json","vulnerability_id":"VCID-ayrx-nm2u-6fde","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0373.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0373.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0373","reference_id":"","reference_type":"","scores":[{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87247","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87257","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87273","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.8727","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.8729","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87298","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87311","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87301","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87315","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.8732","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87314","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.8733","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87336","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87339","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03341","scoring_system":"epss","scoring_elements":"0.87356","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0373"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051699","reference_id":"1051699","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051699"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0373"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ayrx-nm2u-6fde"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61160?format=json","vulnerability_id":"VCID-cbwv-kegx-kqg1","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0416.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0416.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0416","reference_id":"","reference_type":"","scores":[{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83816","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83845","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83847","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.8387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83876","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83892","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83886","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83882","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83941","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83949","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83954","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02055","scoring_system":"epss","scoring_elements":"0.83976","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0416"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051912","reference_id":"1051912","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051912"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0416"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbwv-kegx-kqg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/86399?format=json","vulnerability_id":"VCID-ge4u-gmjr-8qhx","summary":"OpenJDK: jarsigner does not detect unsigned bytecode injected into signed jars","references":[{"reference_url":"http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e","reference_id":"","reference_type":"","scores":[],"url":"http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/d5f36e1c927e"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0414","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0414"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4578.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4578.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4578","reference_id":"","reference_type":"","scores":[{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52286","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52344","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52292","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52334","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52362","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52327","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.5238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52376","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52425","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52409","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52396","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52434","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52441","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0029","scoring_system":"epss","scoring_elements":"0.52382","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4578"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/02/08/6","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/02/08/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2015/02/09/9","reference_id":"","reference_type":"","scores":[],"url":"http://www.openwall.com/lists/oss-security/2015/02/09/9"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1031471","reference_id":"1031471","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1031471"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update10_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update11_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update17_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update17_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update21_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update25_b33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update25_b34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update25_b35:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update45_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update45_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45_b33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update45_b33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45_b33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45_b34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update45_b34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update45_b34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update7_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update9_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update10_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update11_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update17_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update17_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update21_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update25_b33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update25_b34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update25_b35:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update45_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update45_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45_b33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update45_b33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45_b33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45_b34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update45_b34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update45_b34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update7_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9_b31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update9_b32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4578","reference_id":"CVE-2013-4578","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:P/A:N"},{"value":"5.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4578"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"}],"fixed_packages":[],"aliases":["CVE-2013-4578"],"risk_score":2.4,"exploitability":"0.5","weighted_severity":"4.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge4u-gmjr-8qhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61166?format=json","vulnerability_id":"VCID-h6t6-seem-ybcy","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0428.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0428.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0428","reference_id":"","reference_type":"","scores":[{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92148","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92163","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92191","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0428"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051519","reference_id":"1051519","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051519"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0428"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h6t6-seem-ybcy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61164?format=json","vulnerability_id":"VCID-ru3b-tbku-vqdm","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0423.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0423.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0423","reference_id":"","reference_type":"","scores":[{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57505","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57589","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.5761","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57585","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57638","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57646","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57579","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57599","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57578","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00352","scoring_system":"epss","scoring_elements":"0.57534","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0423"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053066","reference_id":"1053066","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1053066"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0423"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ru3b-tbku-vqdm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61163?format=json","vulnerability_id":"VCID-wfz2-6mu3-hbcg","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0422.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-0422.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0422","reference_id":"","reference_type":"","scores":[{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92135","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92142","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92148","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92152","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92163","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92166","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92171","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92167","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92177","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92179","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92183","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92181","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0813","scoring_system":"epss","scoring_elements":"0.92191","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2014-0422"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051528","reference_id":"1051528","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1051528"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0026","reference_id":"RHSA-2014:0026","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0026"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0027","reference_id":"RHSA-2014:0027","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0027"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0030","reference_id":"RHSA-2014:0030","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0030"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0097","reference_id":"RHSA-2014:0097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0134","reference_id":"RHSA-2014:0134","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0134"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0135","reference_id":"RHSA-2014:0135","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0135"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0136","reference_id":"RHSA-2014:0136","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0136"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0705","reference_id":"RHSA-2014:0705","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0705"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0982","reference_id":"RHSA-2014:0982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:0982"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"},{"reference_url":"https://usn.ubuntu.com/2124-1/","reference_id":"USN-2124-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2124-1/"}],"fixed_packages":[],"aliases":["CVE-2014-0422"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wfz2-6mu3-hbcg"}],"fixing_vulnerabilities":[],"risk_score":"2.4","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.16.5-1jpp.1%3Farch=el6_5"}