{"url":"http://public2.vulnerablecode.io/api/packages/123549?format=json","purl":"pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-1.65.1.11.14?arch=el6_4","type":"rpm","namespace":"redhat","name":"java-1.6.0-openjdk","version":"1:1.6.0.0-1.65.1.11.14","qualifiers":{"arch":"el6_4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56379?format=json","vulnerability_id":"VCID-17nn-wrs1-fkb6","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5772.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5772.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5772","reference_id":"","reference_type":"","scores":[{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83911","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5772"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018717","reference_id":"1018717","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018717"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5772"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-17nn-wrs1-fkb6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56401?format=json","vulnerability_id":"VCID-2gme-zs8y-bqec","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5840.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5840","reference_id":"","reference_type":"","scores":[{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82544","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.8464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5840"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018831","reference_id":"1018831","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018831"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5840"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2gme-zs8y-bqec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56397?format=json","vulnerability_id":"VCID-2jj1-ebr5-5bbj","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5820.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5820.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5820","reference_id":"","reference_type":"","scores":[{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83911","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5820"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018972","reference_id":"1018972","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018972"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5820"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2jj1-ebr5-5bbj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56398?format=json","vulnerability_id":"VCID-2nc7-hgsm-9yd7","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5825.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5825","reference_id":"","reference_type":"","scores":[{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89588","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89604","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89605","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89641","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05761","scoring_system":"epss","scoring_elements":"0.9049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05761","scoring_system":"epss","scoring_elements":"0.905","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5825"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019139","reference_id":"1019139","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019139"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5825"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2nc7-hgsm-9yd7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56386?format=json","vulnerability_id":"VCID-6dhw-uqtb-kua5","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5790.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5790","reference_id":"","reference_type":"","scores":[{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82544","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.8464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5790"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018736","reference_id":"1018736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018736"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5790"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dhw-uqtb-kua5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4981?format=json","vulnerability_id":"VCID-6q4h-4h6p-nufq","summary":"Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.","references":[{"reference_url":"http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/a7758faab30d","reference_id":"","reference_type":"","scores":[],"url":"http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/a7758faab30d"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0414","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:0414"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5823.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5823.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5823","reference_id":"","reference_type":"","scores":[{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89641","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89588","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89605","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89604","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05761","scoring_system":"epss","scoring_elements":"0.905","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05761","scoring_system":"epss","scoring_elements":"0.9049","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5823"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-5823"},{"reference_url":"https://github.com/apache/santuario-java/commit/55a48497dfbf3fe63a81e67c13160b3f41ebb1f3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/santuario-java/commit/55a48497dfbf3fe63a81e67c13160b3f41ebb1f3"},{"reference_url":"https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/santuario-java/commit/cea3c91106fb8be35e2f1bb3f1fe0cfddd0ec710"},{"reference_url":"https://github.com/apache/santuario-java/commit/f9a61f2df9473237aa71308c28113540b4063d33","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/santuario-java/commit/f9a61f2df9473237aa71308c28113540b4063d33"},{"reference_url":"https://issues.apache.org/jira/browse/SANTUARIO-334","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/SANTUARIO-334"},{"reference_url":"https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"},{"reference_url":"https://marc.info/?l=bugtraq&m=138674031212883&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://marc.info/?l=bugtraq&m=138674031212883&w=2"},{"reference_url":"https://marc.info/?l=bugtraq&m=138674073720143&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://marc.info/?l=bugtraq&m=138674073720143&w=2"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-5823","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-5823"},{"reference_url":"https://security.gentoo.org/glsa/glsa-201406-32.xml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://security.gentoo.org/glsa/glsa-201406-32.xml"},{"reference_url":"http://svn.apache.org/viewvc?view=revision&revision=1367492","reference_id":"","reference_type":"","scores":[],"url":"http://svn.apache.org/viewvc?view=revision&revision=1367492"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019145","reference_id":"1019145","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019145"},{"reference_url":"https://bugzilla.redhat.com/CVE-2013-5823","reference_id":"CVE-2013-5823","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2013-5823"},{"reference_url":"https://github.com/advisories/GHSA-8gwc-x7mg-7p7p","reference_id":"GHSA-8gwc-x7mg-7p7p","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-8gwc-x7mg-7p7p"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5823","GHSA-8gwc-x7mg-7p7p"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6q4h-4h6p-nufq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56391?format=json","vulnerability_id":"VCID-831v-7kmc-aucv","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5804.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5804","reference_id":"","reference_type":"","scores":[{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83911","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5804"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019131","reference_id":"1019131","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019131"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5804"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-831v-7kmc-aucv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56387?format=json","vulnerability_id":"VCID-8faz-85u1-zbeq","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5797.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5797","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32191","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32049","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44915","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44856","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44908","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.4491","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.4493","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44815","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.449","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44953","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44946","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44807","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44899","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00222","scoring_system":"epss","scoring_elements":"0.44896","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5797"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018720","reference_id":"1018720","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018720"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5797"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8faz-85u1-zbeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56382?format=json","vulnerability_id":"VCID-98s6-fdp7-gkg6","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5780","reference_id":"","reference_type":"","scores":[{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82544","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.8464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5780"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018785","reference_id":"1018785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018785"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5780"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-98s6-fdp7-gkg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4827?format=json","vulnerability_id":"VCID-a6wc-3mp6-63ek","summary":"XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2013/Oct/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00026.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00027.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00028.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00029.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00010.html"},{"reference_url":"http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-updates/2013-11/msg00023.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=138674031212883&w=2","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=138674031212883&w=2"},{"reference_url":"http://marc.info/?l=bugtraq&m=138674073720143&w=2","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=138674073720143&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1059.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1059.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1060.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1060.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1081.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1081.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1440.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1440.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1447.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1447.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1451.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1451.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1505.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2013-1505.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1818.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1818.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1821.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1821.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1822.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1822.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2014-1823.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2014-1823.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0675.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0675.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0720.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0720.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0765.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0765.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2015-0773.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2015-0773.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:0414","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://access.redhat.com/errata/RHSA-2014:0414"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4002.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-4002.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4002","reference_id":"","reference_type":"","scores":[{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90272","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90341","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90342","published_at":"2026-04-24T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90327","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90329","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90313","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90319","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.9032","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90312","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90305","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.9029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05597","scoring_system":"epss","scoring_elements":"0.90269","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07428","scoring_system":"epss","scoring_elements":"0.91783","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07428","scoring_system":"epss","scoring_elements":"0.91769","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-4002"},{"reference_url":"http://secunia.com/advisories/56257","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/56257"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201406-32.xml","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/85260","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/85260"},{"reference_url":"https://github.com/apache/xerces2-j","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/xerces2-j"},{"reference_url":"https://github.com/apache/xerces2-j/commit/266e837852e0f0e3c8c1ad572b6fc4dbb4ded17","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/xerces2-j/commit/266e837852e0f0e3c8c1ad572b6fc4dbb4ded17"},{"reference_url":"https://github.com/apache/xerces2-j/commit/628cbc7142ef9acfb61b8e571aab63504235849","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/apache/xerces2-j/commit/628cbc7142ef9acfb61b8e571aab63504235849"},{"reference_url":"https://issues.apache.org/jira/browse/XERCESJ-1679","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://issues.apache.org/jira/browse/XERCESJ-1679"},{"reference_url":"https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73%40%3Cj-users.xerces.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"},{"reference_url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E","reference_id":"","reference_type":"","scores":[],"url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4002","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"},{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4002"},{"reference_url":"http://support.apple.com/kb/HT5982","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://support.apple.com/kb/HT5982"},{"reference_url":"http://svn.apache.org/viewvc?view=revision&revision=1499506","reference_id":"","reference_type":"","scores":[],"url":"http://svn.apache.org/viewvc?view=revision&revision=1499506"},{"reference_url":"http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=965250&r2=1499506&view=patch"},{"reference_url":"https://www.oracle.com/security-alerts/cpuapr2022.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/security-alerts/cpuapr2022.html"},{"reference_url":"https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg1IC98015"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21644197","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21644197"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21653371","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21653371"},{"reference_url":"http://www-01.ibm.com/support/docview.wss?uid=swg21657539","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www-01.ibm.com/support/docview.wss?uid=swg21657539"},{"reference_url":"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS13-025/index.html"},{"reference_url":"http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ibm.com/connections/blogs/PSIRT/entry/security_bulletin_ibm_filenet_content_manager_and_ibm_content_foundation_xml_4j_denial_of_service_attack_cve_2013_4002"},{"reference_url":"http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ibm.com/developerworks/java/jdk/alerts/#IBM_Security_Update_July_2013"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=swg21648172","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ibm.com/support/docview.wss?uid=swg21648172"},{"reference_url":"http://www.securityfocus.com/bid/61310","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/61310"},{"reference_url":"http://www.ubuntu.com/usn/USN-2033-1","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-2033-1"},{"reference_url":"http://www.ubuntu.com/usn/USN-2089-1","reference_id":"","reference_type":"","scores":[{"value":"HIGH","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-2089-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019176","reference_id":"1019176","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019176"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:apache:xerces2_java:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.6.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.7:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:host_on-demand:11.0.8:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.11.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.12.5:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.14.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.15.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:5.0.16.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.10.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.11.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.12.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.13.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.8.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:6.0.9.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.0.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.1.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.2.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.3.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:java:7.0.4.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_b2b_integrator:5.2.4:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.1:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:sterling_file_gateway:2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.5.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.5.0:update51:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update60:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update40:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*","reference_id":"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:10:sp4:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:10:sp4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_java:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_sdk:11:sp3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:-:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:-:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*"},{"reference_url":"https://bugzilla.redhat.com/CVE-2013-4002","reference_id":"CVE-2013-4002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2013-4002"},{"reference_url":"https://github.com/advisories/GHSA-7j4h-8wpf-rqfh","reference_id":"GHSA-7j4h-8wpf-rqfh","reference_type":"","scores":[{"value":"HIGH","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-7j4h-8wpf-rqfh"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1059","reference_id":"RHSA-2013:1059","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1059"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1060","reference_id":"RHSA-2013:1060","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1060"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1081","reference_id":"RHSA-2013:1081","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1081"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1319","reference_id":"RHSA-2014:1319","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1319"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1818","reference_id":"RHSA-2014:1818","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1818"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1821","reference_id":"RHSA-2014:1821","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1821"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1822","reference_id":"RHSA-2014:1822","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1822"},{"reference_url":"https://access.redhat.com/errata/RHSA-2014:1823","reference_id":"RHSA-2014:1823","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2014:1823"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0234","reference_id":"RHSA-2015:0234","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0234"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0235","reference_id":"RHSA-2015:0235","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0235"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0269","reference_id":"RHSA-2015:0269","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0269"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0675","reference_id":"RHSA-2015:0675","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0675"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0720","reference_id":"RHSA-2015:0720","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0720"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0765","reference_id":"RHSA-2015:0765","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0765"},{"reference_url":"https://access.redhat.com/errata/RHSA-2015:0773","reference_id":"RHSA-2015:0773","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2015:0773"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-4002","GHSA-7j4h-8wpf-rqfh"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a6wc-3mp6-63ek"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56404?format=json","vulnerability_id":"VCID-bkcn-7xu6-g7at","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5850.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5850.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5850","reference_id":"","reference_type":"","scores":[{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.9119","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91195","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91203","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.9121","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91224","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.9123","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91237","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.9124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91264","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91265","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91275","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06689","scoring_system":"epss","scoring_elements":"0.91276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09237","scoring_system":"epss","scoring_elements":"0.92735","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09237","scoring_system":"epss","scoring_elements":"0.92744","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5850"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019127","reference_id":"1019127","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019127"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5850"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcn-7xu6-g7at"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56395?format=json","vulnerability_id":"VCID-dzaq-rw8t-wqba","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5814.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5814","reference_id":"","reference_type":"","scores":[{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.9104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0777","scoring_system":"epss","scoring_elements":"0.9197","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0777","scoring_system":"epss","scoring_elements":"0.91983","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5814"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019117","reference_id":"1019117","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019117"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5814"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dzaq-rw8t-wqba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56396?format=json","vulnerability_id":"VCID-e62p-4szd-3ubj","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5817.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5817","reference_id":"","reference_type":"","scores":[{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.9104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0777","scoring_system":"epss","scoring_elements":"0.9197","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0777","scoring_system":"epss","scoring_elements":"0.91983","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5817"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019118","reference_id":"1019118","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019118"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5817"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-e62p-4szd-3ubj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56403?format=json","vulnerability_id":"VCID-erxc-qxay-ayhr","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5849.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5849","reference_id":"","reference_type":"","scores":[{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82544","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.8464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5849"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018750","reference_id":"1018750","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018750"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5849"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-erxc-qxay-ayhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56394?format=json","vulnerability_id":"VCID-f4d5-mkub-b3e1","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5809.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5809","reference_id":"","reference_type":"","scores":[{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91934","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91942","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.9195","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91956","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91969","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91974","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91976","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91973","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91992","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91985","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.9199","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07797","scoring_system":"epss","scoring_elements":"0.91988","published_at":"2026-04-26T12:55:00Z"},{"value":"0.10705","scoring_system":"epss","scoring_elements":"0.9335","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10705","scoring_system":"epss","scoring_elements":"0.93357","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5809"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019113","reference_id":"1019113","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019113"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5809"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-f4d5-mkub-b3e1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56380?format=json","vulnerability_id":"VCID-khuw-dsag-p7ey","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5774.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5774","reference_id":"","reference_type":"","scores":[{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83911","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5774"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019147","reference_id":"1019147","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019147"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5774"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-khuw-dsag-p7ey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56378?format=json","vulnerability_id":"VCID-kn39-nd68-a7c8","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-3829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3829","reference_id":"","reference_type":"","scores":[{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83911","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-3829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019133","reference_id":"1019133","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019133"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-3829"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kn39-nd68-a7c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56389?format=json","vulnerability_id":"VCID-m2d2-shze-ybgs","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5802.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5802","reference_id":"","reference_type":"","scores":[{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89082","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89091","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89105","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89108","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89126","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89131","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89142","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89138","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89136","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89149","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89146","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89163","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04507","scoring_system":"epss","scoring_elements":"0.89169","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06079","scoring_system":"epss","scoring_elements":"0.90784","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06079","scoring_system":"epss","scoring_elements":"0.90802","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5802"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019130","reference_id":"1019130","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019130"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5802"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m2d2-shze-ybgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56400?format=json","vulnerability_id":"VCID-msup-sd1d-j3b8","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5830.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5830","reference_id":"","reference_type":"","scores":[{"value":"0.06355","scoring_system":"epss","scoring_elements":"0.91029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06355","scoring_system":"epss","scoring_elements":"0.91044","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91421","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.9144","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91446","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91471","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91467","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91449","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91404","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5830"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019110","reference_id":"1019110","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019110"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5830"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-msup-sd1d-j3b8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56399?format=json","vulnerability_id":"VCID-n7ju-v5t7-h3eq","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5829.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5829","reference_id":"","reference_type":"","scores":[{"value":"0.06355","scoring_system":"epss","scoring_elements":"0.91029","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06355","scoring_system":"epss","scoring_elements":"0.91044","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91421","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.9144","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91446","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91398","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91471","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91467","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91477","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91474","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91449","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06966","scoring_system":"epss","scoring_elements":"0.91404","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5829"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019115","reference_id":"1019115","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019115"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5829"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7ju-v5t7-h3eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56383?format=json","vulnerability_id":"VCID-pbdx-8nxr-nbew","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5782","reference_id":"","reference_type":"","scores":[{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90953","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90958","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90967","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90977","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90988","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.90994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91003","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91026","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91028","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.91042","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06362","scoring_system":"epss","scoring_elements":"0.9104","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0777","scoring_system":"epss","scoring_elements":"0.9197","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0777","scoring_system":"epss","scoring_elements":"0.91983","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5782"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019108","reference_id":"1019108","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019108"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5782"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pbdx-8nxr-nbew"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56381?format=json","vulnerability_id":"VCID-q5c8-hwra-zyfr","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5778.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5778","reference_id":"","reference_type":"","scores":[{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82544","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01734","scoring_system":"epss","scoring_elements":"0.82564","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84638","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.8464","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84669","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84686","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84604","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84698","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84699","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.847","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84727","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84736","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0228","scoring_system":"epss","scoring_elements":"0.84618","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5778"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018984","reference_id":"1018984","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018984"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5778"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q5c8-hwra-zyfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56390?format=json","vulnerability_id":"VCID-qmvf-8y88-gqhh","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5803.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5803","reference_id":"","reference_type":"","scores":[{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89588","published_at":"2026-04-01T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89591","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89604","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89605","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89622","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89627","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89634","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89633","published_at":"2026-04-12T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89626","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89641","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89642","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89636","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89652","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04936","scoring_system":"epss","scoring_elements":"0.89656","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05761","scoring_system":"epss","scoring_elements":"0.9049","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05761","scoring_system":"epss","scoring_elements":"0.905","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5803"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018713","reference_id":"1018713","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018713"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5803"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qmvf-8y88-gqhh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56385?format=json","vulnerability_id":"VCID-sk3j-q3uf-5yfp","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5784.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5784.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5784","reference_id":"","reference_type":"","scores":[{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83002","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01835","scoring_system":"epss","scoring_elements":"0.83025","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83927","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8393","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83953","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.8396","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83975","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83896","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83965","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83989","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83991","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84024","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83969","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83911","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5784"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018727","reference_id":"1018727","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1018727"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5784"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sk3j-q3uf-5yfp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56384?format=json","vulnerability_id":"VCID-uvbz-c5pd-a3hc","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5783.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5783","reference_id":"","reference_type":"","scores":[{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84906","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02337","scoring_system":"epss","scoring_elements":"0.84923","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85665","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85673","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85692","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85703","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85717","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85713","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85636","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85731","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85736","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.8573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85754","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85764","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85709","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0264","scoring_system":"epss","scoring_elements":"0.85648","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5783"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019137","reference_id":"1019137","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019137"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5783"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uvbz-c5pd-a3hc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56402?format=json","vulnerability_id":"VCID-z63k-wes3-gqgw","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2013-5842.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5842","reference_id":"","reference_type":"","scores":[{"value":"0.17107","scoring_system":"epss","scoring_elements":"0.95016","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17107","scoring_system":"epss","scoring_elements":"0.95026","published_at":"2026-05-05T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95492","published_at":"2026-04-04T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95497","published_at":"2026-04-07T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95503","published_at":"2026-04-08T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95506","published_at":"2026-04-09T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95511","published_at":"2026-04-11T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95477","published_at":"2026-04-01T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95513","published_at":"2026-04-13T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95526","published_at":"2026-04-18T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95529","published_at":"2026-04-24T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95531","published_at":"2026-04-26T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95512","published_at":"2026-04-12T12:55:00Z"},{"value":"0.20269","scoring_system":"epss","scoring_elements":"0.95486","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2013-5842"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019123","reference_id":"1019123","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1019123"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1440","reference_id":"RHSA-2013:1440","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1440"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1447","reference_id":"RHSA-2013:1447","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1447"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1451","reference_id":"RHSA-2013:1451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1505","reference_id":"RHSA-2013:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1507","reference_id":"RHSA-2013:1507","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1507"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1508","reference_id":"RHSA-2013:1508","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1508"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1509","reference_id":"RHSA-2013:1509","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1509"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1793","reference_id":"RHSA-2013:1793","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1793"},{"reference_url":"https://usn.ubuntu.com/2033-1/","reference_id":"USN-2033-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2033-1/"},{"reference_url":"https://usn.ubuntu.com/2089-1/","reference_id":"USN-2089-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/2089-1/"}],"fixed_packages":[],"aliases":["CVE-2013-5842"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z63k-wes3-gqgw"}],"fixing_vulnerabilities":[],"risk_score":"4.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.6.0-openjdk@1:1.6.0.0-1.65.1.11.14%3Farch=el6_4"}