{"url":"http://public2.vulnerablecode.io/api/packages/125953?format=json","purl":"pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.5-1jpp.1?arch=el6","type":"rpm","namespace":"redhat","name":"java-1.7.0-oracle","version":"1:1.7.0.5-1jpp.1","qualifiers":{"arch":"el6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56313?format=json","vulnerability_id":"VCID-4arp-hkg6-w7hd","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1726.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1726","reference_id":"","reference_type":"","scores":[{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61739","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61785","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61762","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61772","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61715","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61827","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61782","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61811","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61866","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1726"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829377","reference_id":"829377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829377"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"}],"fixed_packages":[],"aliases":["CVE-2012-1726"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4arp-hkg6-w7hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56312?format=json","vulnerability_id":"VCID-76wu-nfc9-ebb5","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1725","reference_id":"","reference_type":"","scores":[{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.8954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89585","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89599","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89595","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89605","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89625","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1725"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829376","reference_id":"829376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829376"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1725"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76wu-nfc9-ebb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61036?format=json","vulnerability_id":"VCID-91fb-xx5h-ukfx","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1721.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1721.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1721","reference_id":"","reference_type":"","scores":[{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86527","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.8659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86619","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86647","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86681","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86688","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1721"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=831353","reference_id":"831353","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=831353"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"}],"fixed_packages":[],"aliases":["CVE-2012-1721"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-91fb-xx5h-ukfx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56305?format=json","vulnerability_id":"VCID-9n7g-864v-hufw","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1711.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1711","reference_id":"","reference_type":"","scores":[{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75037","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75077","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75111","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75089","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75113","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75152","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75156","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75159","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75168","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75197","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75221","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75202","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75211","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75266","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1711"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829354","reference_id":"829354","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829354"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1711"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9n7g-864v-hufw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/87062?format=json","vulnerability_id":"VCID-dkkq-dwta-nudb","summary":"JDK: unspecified vulnerability fixed in 6u33 and 7u5 (Deployment)","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0551.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0551.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0551","reference_id":"","reference_type":"","scores":[{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96545","published_at":"2026-04-01T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96554","published_at":"2026-04-02T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.9656","published_at":"2026-04-04T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96563","published_at":"2026-04-07T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96571","published_at":"2026-04-08T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96573","published_at":"2026-04-09T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96575","published_at":"2026-04-11T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96576","published_at":"2026-04-12T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96578","published_at":"2026-04-13T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96585","published_at":"2026-04-16T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96591","published_at":"2026-04-18T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96595","published_at":"2026-04-26T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96597","published_at":"2026-04-29T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96604","published_at":"2026-05-05T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96606","published_at":"2026-05-07T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96611","published_at":"2026-05-09T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96614","published_at":"2026-05-11T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96619","published_at":"2026-05-12T12:55:00Z"},{"value":"0.29065","scoring_system":"epss","scoring_elements":"0.96627","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-0551"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=831355","reference_id":"831355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=831355"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/webapps/18764.txt","reference_id":"CVE-2012-0551;OSVDB-81250;OSVDB-81237;OSVDB-81236;OSVDB-81235;OSVDB-81234;OSVDB-81233;OSVDB-81232;OSVDB-81231;OSVDB-81230;OSVDB-81229;OSVDB-81228;OSVDB-81227;OSVDB-81226","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/webapps/18764.txt"},{"reference_url":"http://www.security-assessment.com/files/documents/advisory/Oracle_GlassFish_Server_Multiple_XSS.pdf","reference_id":"CVE-2012-0551;OSVDB-81250;OSVDB-81237;OSVDB-81236;OSVDB-81235;OSVDB-81234;OSVDB-81233;OSVDB-81232;OSVDB-81231;OSVDB-81230;OSVDB-81229;OSVDB-81228;OSVDB-81227;OSVDB-81226","reference_type":"exploit","scores":[],"url":"http://www.security-assessment.com/files/documents/advisory/Oracle_GlassFish_Server_Multiple_XSS.pdf"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"}],"fixed_packages":[],"aliases":["CVE-2012-0551"],"risk_score":0.6,"exploitability":"2.0","weighted_severity":"0.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dkkq-dwta-nudb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61037?format=json","vulnerability_id":"VCID-fejr-r95x-5bht","summary":"Multiple vulnerabilities have been found in the Oracle JRE/JDK,\n    allowing attackers to cause unspecified impact.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1722.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1722.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1722","reference_id":"","reference_type":"","scores":[{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86527","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86538","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86556","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86575","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86585","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.866","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.8659","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86604","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86609","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86601","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86619","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86627","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86626","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86647","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86665","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86681","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86677","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86688","published_at":"2026-05-12T12:55:00Z"},{"value":"0.03008","scoring_system":"epss","scoring_elements":"0.86721","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=831354","reference_id":"831354","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=831354"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"}],"fixed_packages":[],"aliases":["CVE-2012-1722"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fejr-r95x-5bht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56310?format=json","vulnerability_id":"VCID-fftg-8wp1-bqdy","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1719","reference_id":"","reference_type":"","scores":[{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85149","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85201","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85221","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85239","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85271","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85269","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85284","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85311","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85329","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85323","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85337","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85375","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829371","reference_id":"829371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829371"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1719"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fftg-8wp1-bqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56306?format=json","vulnerability_id":"VCID-jrxs-q15y-pudg","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1713","reference_id":"","reference_type":"","scores":[{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91008","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91083","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91099","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91107","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91121","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91133","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91132","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.9114","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91151","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1713"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829361","reference_id":"829361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829361"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1713"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrxs-q15y-pudg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56307?format=json","vulnerability_id":"VCID-nj59-1wrw-kbd1","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1716","reference_id":"","reference_type":"","scores":[{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.8954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89567","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89585","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89599","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89595","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89605","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89625","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829360","reference_id":"829360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829360"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1716"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nj59-1wrw-kbd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56311?format=json","vulnerability_id":"VCID-p127-f7pc-gfen","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1723.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1723","reference_id":"","reference_type":"","scores":[{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99906","published_at":"2026-04-16T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99909","published_at":"2026-05-12T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99908","published_at":"2026-05-09T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99905","published_at":"2026-04-12T12:55:00Z"},{"value":"0.94093","scoring_system":"epss","scoring_elements":"0.99909","published_at":"2026-05-14T12:55:00Z"},{"value":"0.94093","scoring_system":"epss","scoring_elements":"0.99907","published_at":"2026-04-26T12:55:00Z"},{"value":"0.94093","scoring_system":"epss","scoring_elements":"0.99908","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1723"},{"reference_url":"http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html","reference_id":"019076.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html"},{"reference_url":"http://secunia.com/advisories/51080","reference_id":"51080","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://secunia.com/advisories/51080"},{"reference_url":"http://www.securityfocus.com/bid/53960","reference_id":"53960","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://www.securityfocus.com/bid/53960"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829373","reference_id":"829373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829373"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:095","reference_id":"advisories?name=MDVSA-2012:095","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:095"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/remote/19717.rb","reference_id":"CVE-2012-1723;OSVDB-82877","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/remote/19717.rb"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=swg21615246","reference_id":"docview.wss?uid=swg21615246","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://www.ibm.com/support/docview.wss?uid=swg21615246"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html","reference_id":"javacpujun2012-1515912.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=134496371727681&w=2","reference_id":"?l=bugtraq&m=134496371727681&w=2","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://marc.info/?l=bugtraq&m=134496371727681&w=2"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259","reference_id":"oval%3Aorg.mitre.oval%3Adef%3A16259","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0734.html","reference_id":"RHSA-2012-0734.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2012-0734.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1723"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p127-f7pc-gfen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6732?format=json","vulnerability_id":"VCID-qfw9-f3rm-kfah","summary":"Excessive Iteration\nXerces allows remote attackers to affect availability.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1724.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1724","reference_id":"","reference_type":"","scores":[{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85238","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8525","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8533","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85331","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85328","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8535","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85358","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85372","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85399","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85417","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85413","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85426","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85463","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1724"},{"reference_url":"http://svn.apache.org/viewvc?view=revision&revision=319059","reference_id":"","reference_type":"","scores":[],"url":"http://svn.apache.org/viewvc?view=revision&revision=319059"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829374","reference_id":"829374","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829374"},{"reference_url":"https://bugzilla.redhat.com/CVE-2012-1724","reference_id":"CVE-2012-1724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2012-1724"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1724"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qfw9-f3rm-kfah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56308?format=json","vulnerability_id":"VCID-qswt-y34k-5kc8","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1717","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33088","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33127","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33124","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.331","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33079","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32842","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32731","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32799","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32839","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32747","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32772","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3285","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829358","reference_id":"829358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829358"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1717"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qswt-y34k-5kc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56309?format=json","vulnerability_id":"VCID-tt7k-yzuf-9bc4","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1718.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1718","reference_id":"","reference_type":"","scores":[{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89836","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89852","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.8988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89884","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89892","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89893","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.899","published_at":"2026-04-29T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89914","published_at":"2026-05-05T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89929","published_at":"2026-05-07T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.8994","published_at":"2026-05-09T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89935","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89943","published_at":"2026-05-12T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89958","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1718"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829372","reference_id":"829372","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829372"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1467","reference_id":"RHSA-2012:1467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1718"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tt7k-yzuf-9bc4"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-oracle@1:1.7.0.5-1jpp.1%3Farch=el6"}