{"url":"http://public2.vulnerablecode.io/api/packages/125956?format=json","purl":"pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.5-2.2.1?arch=el6_3","type":"rpm","namespace":"redhat","name":"java-1.7.0-openjdk","version":"1:1.7.0.5-2.2.1","qualifiers":{"arch":"el6_3"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56313?format=json","vulnerability_id":"VCID-4arp-hkg6-w7hd","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1726.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1726.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1726","reference_id":"","reference_type":"","scores":[{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61609","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61713","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61734","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61749","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6177","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61758","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61739","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.6178","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61785","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61767","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61762","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61779","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00417","scoring_system":"epss","scoring_elements":"0.61772","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1726"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829377","reference_id":"829377","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829377"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"}],"fixed_packages":[],"aliases":["CVE-2012-1726"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4arp-hkg6-w7hd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56312?format=json","vulnerability_id":"VCID-76wu-nfc9-ebb5","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1725.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1725","reference_id":"","reference_type":"","scores":[{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.8954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89559","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1725"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829376","reference_id":"829376","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829376"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1725"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76wu-nfc9-ebb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56305?format=json","vulnerability_id":"VCID-9n7g-864v-hufw","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1711.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1711.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1711","reference_id":"","reference_type":"","scores":[{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75035","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75037","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75066","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75043","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75077","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75088","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75111","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75089","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75116","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75113","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75152","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75156","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00863","scoring_system":"epss","scoring_elements":"0.75159","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1711"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829354","reference_id":"829354","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829354"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1711"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9n7g-864v-hufw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56310?format=json","vulnerability_id":"VCID-fftg-8wp1-bqdy","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1719","reference_id":"","reference_type":"","scores":[{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85149","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.8516","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85201","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85209","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85224","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85221","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85217","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85238","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85239","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85262","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85271","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02455","scoring_system":"epss","scoring_elements":"0.85269","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1719"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829371","reference_id":"829371","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829371"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1719"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fftg-8wp1-bqdy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56306?format=json","vulnerability_id":"VCID-jrxs-q15y-pudg","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1713.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1713","reference_id":"","reference_type":"","scores":[{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91008","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91013","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91022","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91044","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91051","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91059","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.9106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91083","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91085","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91099","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0643","scoring_system":"epss","scoring_elements":"0.91092","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1713"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829361","reference_id":"829361","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829361"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1713"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jrxs-q15y-pudg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56307?format=json","vulnerability_id":"VCID-nj59-1wrw-kbd1","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1716.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1716","reference_id":"","reference_type":"","scores":[{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89492","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89507","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89524","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89527","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89535","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89532","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89528","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89541","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89543","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.8954","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89555","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0484","scoring_system":"epss","scoring_elements":"0.89559","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1716"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829360","reference_id":"829360","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829360"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1716"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nj59-1wrw-kbd1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56311?format=json","vulnerability_id":"VCID-p127-f7pc-gfen","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1723.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1723.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1723","reference_id":"","reference_type":"","scores":[{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99906","published_at":"2026-04-16T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99905","published_at":"2026-04-12T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.94083","scoring_system":"epss","scoring_elements":"0.99904","published_at":"2026-04-04T12:55:00Z"},{"value":"0.94093","scoring_system":"epss","scoring_elements":"0.99908","published_at":"2026-04-29T12:55:00Z"},{"value":"0.94093","scoring_system":"epss","scoring_elements":"0.99907","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1723"},{"reference_url":"http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html","reference_id":"019076.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://mail.openjdk.java.net/pipermail/distro-pkg-dev/2012-June/019076.html"},{"reference_url":"http://secunia.com/advisories/51080","reference_id":"51080","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://secunia.com/advisories/51080"},{"reference_url":"http://www.securityfocus.com/bid/53960","reference_id":"53960","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://www.securityfocus.com/bid/53960"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829373","reference_id":"829373","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829373"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:095","reference_id":"advisories?name=MDVSA-2012:095","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2012:095"},{"reference_url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/remote/19717.rb","reference_id":"CVE-2012-1723;OSVDB-82877","reference_type":"exploit","scores":[],"url":"https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/java/remote/19717.rb"},{"reference_url":"http://www.ibm.com/support/docview.wss?uid=swg21615246","reference_id":"docview.wss?uid=swg21615246","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://www.ibm.com/support/docview.wss?uid=swg21615246"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html","reference_id":"javacpujun2012-1515912.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://www.oracle.com/technetwork/topics/security/javacpujun2012-1515912.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=134496371727681&w=2","reference_id":"?l=bugtraq&m=134496371727681&w=2","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://marc.info/?l=bugtraq&m=134496371727681&w=2"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259","reference_id":"oval%3Aorg.mitre.oval%3Adef%3A16259","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16259"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-0734.html","reference_id":"RHSA-2012-0734.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Act","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T19:23:25Z/"}],"url":"http://rhn.redhat.com/errata/RHSA-2012-0734.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1723"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p127-f7pc-gfen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/6732?format=json","vulnerability_id":"VCID-qfw9-f3rm-kfah","summary":"Excessive Iteration\nXerces allows remote attackers to affect availability.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1724.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1724.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1724","reference_id":"","reference_type":"","scores":[{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85238","published_at":"2026-04-01T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8525","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85269","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8527","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85292","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.853","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85313","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8531","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8533","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85331","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85328","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.8535","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85359","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02488","scoring_system":"epss","scoring_elements":"0.85358","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1724"},{"reference_url":"http://svn.apache.org/viewvc?view=revision&revision=319059","reference_id":"","reference_type":"","scores":[],"url":"http://svn.apache.org/viewvc?view=revision&revision=319059"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829374","reference_id":"829374","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829374"},{"reference_url":"https://bugzilla.redhat.com/CVE-2012-1724","reference_id":"CVE-2012-1724","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2012-1724"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1724"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qfw9-f3rm-kfah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56308?format=json","vulnerability_id":"VCID-qswt-y34k-5kc8","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1717","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33088","published_at":"2026-04-01T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33219","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33084","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33127","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3316","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33163","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33124","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.331","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33141","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33079","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32932","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32916","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32842","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1717"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829358","reference_id":"829358","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829358"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1289","reference_id":"RHSA-2012:1289","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1289"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1717"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qswt-y34k-5kc8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56309?format=json","vulnerability_id":"VCID-tt7k-yzuf-9bc4","summary":"Multiple vulnerabilities have been found in the IcedTea JDK, the\n    worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1718.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-1718.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1718","reference_id":"","reference_type":"","scores":[{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89836","published_at":"2026-04-01T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89839","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89852","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89857","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89874","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.8988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89887","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89884","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89877","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89892","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89893","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89886","published_at":"2026-04-21T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.89901","published_at":"2026-04-26T12:55:00Z"},{"value":"0.05146","scoring_system":"epss","scoring_elements":"0.899","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2012-1718"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=829372","reference_id":"829372","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=829372"},{"reference_url":"https://security.gentoo.org/glsa/201401-30","reference_id":"GLSA-201401-30","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201401-30"},{"reference_url":"https://security.gentoo.org/glsa/201406-32","reference_id":"GLSA-201406-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/201406-32"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0729","reference_id":"RHSA-2012:0729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0729"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0730","reference_id":"RHSA-2012:0730","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0730"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0734","reference_id":"RHSA-2012:0734","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0734"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1009","reference_id":"RHSA-2012:1009","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1009"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1019","reference_id":"RHSA-2012:1019","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1019"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1238","reference_id":"RHSA-2012:1238","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1238"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1243","reference_id":"RHSA-2012:1243","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1243"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1245","reference_id":"RHSA-2012:1245","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1245"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1332","reference_id":"RHSA-2012:1332","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1467","reference_id":"RHSA-2012:1467","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1467"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1455","reference_id":"RHSA-2013:1455","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1455"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:1456","reference_id":"RHSA-2013:1456","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:1456"},{"reference_url":"https://usn.ubuntu.com/1505-1/","reference_id":"USN-1505-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/1505-1/"}],"fixed_packages":[],"aliases":["CVE-2012-1718"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-tt7k-yzuf-9bc4"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.7.0-openjdk@1:1.7.0.5-2.2.1%3Farch=el6_3"}