{"url":"http://public2.vulnerablecode.io/api/packages/125834?format=json","purl":"pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.2.0-1jpp.3?arch=el6_3","type":"rpm","namespace":"redhat","name":"java-1.7.0-ibm","version":"1:1.7.0.2.0-1jpp.3","qualifiers":{"arch":"el6_3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56313?format=json","vulnerability_id":"VCID-4arp-hkg6-w7hd","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1726.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1726","reference_id":"","reference_type":"","scores":[{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61739","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61785","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61762","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61715","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61827","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61782","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61811","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61866","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1726"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829377","reference_id":"829377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829377"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"}],"fixed_packages":[],"aliases":["CVE-2012-1726"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4arp-hkg6-w7hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61038?format=json","vulnerability_id":"VCID-5jk9-kwhs-4kfa","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=135109152819176&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=135109152819176&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1225.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1225.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3136.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-3136.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3136","reference_id":"","reference_type":"","scores":[{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77482","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77225","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77232","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77261","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77242","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77274","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.7731","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.7729","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77287","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77327","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77319","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77353","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77371","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77379","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77406","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77427","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77417","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01027","scoring_system":"epss","scoring_elements":"0.77435","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-3136"},{"reference_url":"http://secunia.com/advisories/51044","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51044"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=853138","reference_id":"853138","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=853138"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:*:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3136","reference_id":"CVE-2012-3136","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-3136"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1223","reference_id":"RHSA-2012:1223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1225","reference_id":"RHSA-2012:1225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"}],"fixed_packages":[],"aliases":["CVE-2012-3136"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5jk9-kwhs-4kfa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56312?format=json","vulnerability_id":"VCID-76wu-nfc9-ebb5","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1725","reference_id":"","reference_type":"","scores":[{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.8954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89585","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89599","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89595","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89605","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89625","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1725"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829376","reference_id":"829376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829376"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1725"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76wu-nfc9-ebb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61036?format=json","vulnerability_id":"VCID-91fb-xx5h-ukfx","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1721.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1721","reference_id":"","reference_type":"","scores":[{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86527","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.8659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86619","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86647","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86681","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86688","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1721"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=831353","reference_id":"831353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=831353"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"}],"fixed_packages":[],"aliases":["CVE-2012-1721"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-91fb-xx5h-ukfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87062?format=json","vulnerability_id":"VCID-dkkq-dwta-nudb","summary":"JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0551.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0551","reference_id":"","reference_type":"","scores":[{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96545","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.9656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96591","published_at":"2026-04-18T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96595","published_at":"2026-04-26T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96597","published_at":"2026-04-29T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96604","published_at":"2026-05-05T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96606","published_at":"2026-05-07T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96614","published_at":"2026-05-11T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96619","published_at":"2026-05-12T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96627","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0551"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=831355","reference_id":"831355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=831355"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/webapps/18764.txt","reference_id":"CVE-2012-0551;OSVDB-81250;OSVDB-81237;OSVDB-81236;OSVDB-81235;OSVDB-81234;OSVDB-81233;OSVDB-81232;OSVDB-81231;OSVDB-81230;OSVDB-81229;OSVDB-81228;OSVDB-81227;OSVDB-81226","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/webapps/18764.txt"},{"reference_url":"http://www.security-assessment.com/files/documents/advisory/Oracle_GlassFish_Server_Multiple_XSS.pdf","reference_id":"CVE-2012-0551;OSVDB-81250;OSVDB-81237;OSVDB-81236;OSVDB-81235;OSVDB-81234;OSVDB-81233;OSVDB-81232;OSVDB-81231;OSVDB-81230;OSVDB-81229;OSVDB-81228;OSVDB-81227;OSVDB-81226","reference_type":"exploit","scores":[],"url":"http://www.security-assessment.com/files/documents/advisory/Oracle_GlassFish_Server_Multiple_XSS.pdf"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"}],"fixed_packages":[],"aliases":["CVE-2012-0551"],"risk_score":0.6,"exploitability":"2.0","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dkkq-dwta-nudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61037?format=json","vulnerability_id":"VCID-fejr-r95x-5bht","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1722.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1722","reference_id":"","reference_type":"","scores":[{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86527","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.8659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86619","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86647","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86681","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86688","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=831354","reference_id":"831354","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=831354"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"}],"fixed_packages":[],"aliases":["CVE-2012-1722"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fejr-r95x-5bht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56310?format=json","vulnerability_id":"VCID-fftg-8wp1-bqdy","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1719","reference_id":"","reference_type":"","scores":[{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85149","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85201","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85221","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85239","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85271","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85269","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85284","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85311","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85329","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85323","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85337","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85375","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829371","reference_id":"829371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829371"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1719"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fftg-8wp1-bqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56306?format=json","vulnerability_id":"VCID-jrxs-q15y-pudg","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1713","reference_id":"","reference_type":"","scores":[{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91008","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91083","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91099","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91133","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91132","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.9114","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91151","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1713"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829361","reference_id":"829361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829361"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1713"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrxs-q15y-pudg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56307?format=json","vulnerability_id":"VCID-nj59-1wrw-kbd1","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1716","reference_id":"","reference_type":"","scores":[{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.8954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89585","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89599","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89595","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89605","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89625","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829360","reference_id":"829360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829360"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1716"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nj59-1wrw-kbd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56308?format=json","vulnerability_id":"VCID-qswt-y34k-5kc8","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1717","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33088","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33127","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33124","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.331","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33079","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32842","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32731","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32799","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32839","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32747","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32772","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3285","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829358","reference_id":"829358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829358"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1717"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qswt-y34k-5kc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61044?format=json","vulnerability_id":"VCID-sw7w-bref-83aq","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://blog.fireeye.com/research/2012/08/zero-day-season-is-not-over-yet.html"},{"reference_url":"http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://immunityproducts.blogspot.com/2012/08/java-0day-analysis-cve-2012-4681.html"},{"reference_url":"http://labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://labs.alienvault.com/labs/index.php/2012/new-java-0day-exploited-in-the-wild/"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=135109152819176&w=2","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://marc.info/?l=bugtraq&m=135109152819176&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1225.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2012-1225.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4681.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-4681.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4681","reference_id":"","reference_type":"","scores":[{"value":"0.9414","scoring_system":"epss","scoring_elements":"0.99913","published_at":"2026-04-04T12:55:00Z"},{"value":"0.9414","scoring_system":"epss","scoring_elements":"0.99914","published_at":"2026-04-18T12:55:00Z"},{"value":"0.9414","scoring_system":"epss","scoring_elements":"0.99915","published_at":"2026-04-21T12:55:00Z"},{"value":"0.9414","scoring_system":"epss","scoring_elements":"0.99916","published_at":"2026-05-14T12:55:00Z"},{"value":"0.9414","scoring_system":"epss","scoring_elements":"0.99917","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-4681"},{"reference_url":"https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"https://community.rapid7.com/community/metasploit/blog/2012/08/27/lets-start-the-week-with-a-new-java-0day"},{"reference_url":"http://secunia.com/advisories/51044","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://secunia.com/advisories/51044"},{"reference_url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-4681","reference_id":"","reference_type":"","scores":[],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2012-4681"},{"reference_url":"http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://www.deependresearch.org/2012/08/java-7-vulnerability-analysis.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html"},{"reference_url":"http://www.securityfocus.com/bid/55213","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://www.securityfocus.com/bid/55213"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA12-240A.html","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:02:21Z/"}],"url":"http://www.us-cert.gov/cas/techalerts/TA12-240A.html"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=852051","reference_id":"852051","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=852051"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update18:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update19:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update18:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update19:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:-:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4681","reference_id":"CVE-2012-4681","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"},{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-4681"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1223","reference_id":"RHSA-2012:1223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1225","reference_id":"RHSA-2012:1225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"}],"fixed_packages":[],"aliases":["CVE-2012-4681"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sw7w-bref-83aq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56304?format=json","vulnerability_id":"VCID-tft2-nbge-kya2","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=135161897205627&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=135161897205627&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1222.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1222.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1225.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1225.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1392.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1392.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1466.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1466.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0547.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0547.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0547","reference_id":"","reference_type":"","scores":[{"value":"0.08542","scoring_system":"epss","scoring_elements":"0.92465","published_at":"2026-05-14T12:55:00Z"},{"value":"0.08542","scoring_system":"epss","scoring_elements":"0.92416","published_at":"2026-05-05T12:55:00Z"},{"value":"0.08542","scoring_system":"epss","scoring_elements":"0.92426","published_at":"2026-05-07T12:55:00Z"},{"value":"0.08542","scoring_system":"epss","scoring_elements":"0.92435","published_at":"2026-05-09T12:55:00Z"},{"value":"0.08542","scoring_system":"epss","scoring_elements":"0.92439","published_at":"2026-05-11T12:55:00Z"},{"value":"0.08542","scoring_system":"epss","scoring_elements":"0.92445","published_at":"2026-05-12T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.92992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.92991","published_at":"2026-04-12T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.92963","published_at":"2026-04-01T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.93004","published_at":"2026-04-18T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.93012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.93017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.93002","published_at":"2026-04-16T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.92971","published_at":"2026-04-02T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.92976","published_at":"2026-04-04T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.92975","published_at":"2026-04-07T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.92983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.09871","scoring_system":"epss","scoring_elements":"0.92987","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0547"},{"reference_url":"http://secunia.com/advisories/51044","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51044"},{"reference_url":"http://secunia.com/advisories/51141","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51141"},{"reference_url":"http://secunia.com/advisories/51327","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51327"},{"reference_url":"http://security.gentoo.org/glsa/glsa-201406-32.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-201406-32.xml"},{"reference_url":"https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03533078","reference_id":"","reference_type":"","scores":[],"url":"https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03533078"},{"reference_url":"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS12-023/index.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html"},{"reference_url":"http://www.securityfocus.com/bid/55339","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/55339"},{"reference_url":"http://www.ubuntu.com/usn/USN-1553-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1553-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=853228","reference_id":"853228","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=853228"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:*:update34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update34:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:*:update34:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update34:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-0547","reference_id":"CVE-2012-0547","reference_type":"","scores":[{"value":"","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:N"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-0547"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/remote/20865.rb","reference_id":"CVE-2012-4681;OSVDB-84980;CVE-2012-3539;CVE-2012-0547;OSVDB-84867","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/remote/20865.rb"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1221","reference_id":"RHSA-2012:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1222","reference_id":"RHSA-2012:1222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1223","reference_id":"RHSA-2012:1223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1225","reference_id":"RHSA-2012:1225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1392","reference_id":"RHSA-2012:1392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1466","reference_id":"RHSA-2012:1466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1553-1/","reference_id":"USN-1553-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1553-1/"}],"fixed_packages":[],"aliases":["CVE-2012-0547"],"risk_score":0.2,"exploitability":"2.0","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tft2-nbge-kya2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61035?format=json","vulnerability_id":"VCID-vqyx-33vq-fqdt","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00006.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00019.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00032.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=135109152819176&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=135109152819176&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1222.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1222.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1225.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1225.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1466.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2012-1466.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1455.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2013-1456.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1682.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1682.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1682","reference_id":"","reference_type":"","scores":[{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86556","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86347","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86357","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86375","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86395","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86405","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86419","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86417","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86412","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86428","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86433","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86427","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86446","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86455","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86453","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86473","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86493","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86512","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86509","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02927","scoring_system":"epss","scoring_elements":"0.86521","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1682"},{"reference_url":"http://secunia.com/advisories/51044","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51044"},{"reference_url":"http://secunia.com/advisories/51327","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/51327"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/alert-cve-2012-4681-1835715.html"},{"reference_url":"http://www.ubuntu.com/usn/USN-1553-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/USN-1553-1"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=853097","reference_id":"853097","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=853097"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jdk:*:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jdk:*:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:oracle:jre:*:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1682","reference_id":"CVE-2012-1682","reference_type":"","scores":[{"value":"10.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:C/I:C/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-1682"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1221","reference_id":"RHSA-2012:1221","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1221"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1222","reference_id":"RHSA-2012:1222","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1222"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1223","reference_id":"RHSA-2012:1223","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1223"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1225","reference_id":"RHSA-2012:1225","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1225"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1466","reference_id":"RHSA-2012:1466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1553-1/","reference_id":"USN-1553-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1553-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1682"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vqyx-33vq-fqdt"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-ibm@1:1.7.0.2.0-1jpp.3%3Farch=el6_3"}