{"url":"http://public2.vulnerablecode.io/api/packages/128192?format=json","purl":"pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.2.sap-1jpp.4?arch=el4_8","type":"rpm","namespace":"redhat","name":"java-1.4.2-ibm","version":"1.4.2.13.2.sap-1jpp.4","qualifiers":{"arch":"el4_8"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4799?format=json","vulnerability_id":"VCID-2gpd-vwgb-67cn","summary":"XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=125787273209737&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=125787273209737&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1232.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2012-1232.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1537.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2012-1537.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2625.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2625","reference_id":"","reference_type":"","scores":[{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79484","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79326","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79323","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79356","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79361","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79377","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79386","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79407","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79425","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79426","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79444","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81485","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81479","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01746","scoring_system":"epss","scoring_elements":"0.82541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01746","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2625"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=512921","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=512921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625"},{"reference_url":"http://secunia.com/advisories/36162","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/36162"},{"reference_url":"http://secunia.com/advisories/36176","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/36176"},{"reference_url":"http://secunia.com/advisories/36180","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/36180"},{"reference_url":"http://secunia.com/advisories/36199","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/36199"},{"reference_url":"http://secunia.com/advisories/37300","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/37300"},{"reference_url":"http://secunia.com/advisories/37460","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/37460"},{"reference_url":"http://secunia.com/advisories/37671","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/37671"},{"reference_url":"http://secunia.com/advisories/37754","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/37754"},{"reference_url":"http://secunia.com/advisories/38231","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/38231"},{"reference_url":"http://secunia.com/advisories/38342","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/38342"},{"reference_url":"http://secunia.com/advisories/43300","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/43300"},{"reference_url":"http://secunia.com/advisories/50549","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/50549"},{"reference_url":"https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026"},{"reference_url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2625","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2625"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1199.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1199.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1200.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1200.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1201.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1201.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1636.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1636.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1637.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1637.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1649.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1649.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1650.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1650.html"},{"reference_url":"https://snyk.io/vuln/SNYK-JAVA-XERCES-32014","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://snyk.io/vuln/SNYK-JAVA-XERCES-32014"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1"},{"reference_url":"http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"},{"reference_url":"http://www.cert.fi/en/reports/2009/vulnerability2009085.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.cert.fi/en/reports/2009/vulnerability2009085.html"},{"reference_url":"http://www.codenomicon.com/labs/xml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.codenomicon.com/labs/xml"},{"reference_url":"http://www.codenomicon.com/labs/xml/","reference_id":"","reference_type":"","scores":[],"url":"http://www.codenomicon.com/labs/xml/"},{"reference_url":"http://www.debian.org/security/2010/dsa-1984","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2010/dsa-1984"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:108","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:108"},{"reference_url":"http://www.networkworld.com/columnists/2009/080509-xml-flaw.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.networkworld.com/columnists/2009/080509-xml-flaw.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/09/06/1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/09/06/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/10/22/9","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/10/22/9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/10/23/6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/10/23/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/10/26/3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/10/26/3"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-1615.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2009-1615.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0858.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2011-0858.html"},{"reference_url":"http://www.securityfocus.com/archive/1/507985/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/archive/1/507985/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/35958","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/35958"},{"reference_url":"http://www.securitytracker.com/id?1022680","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securitytracker.com/id?1022680"},{"reference_url":"http://www.ubuntu.com/usn/USN-890-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-890-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA09-294A.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.us-cert.gov/cas/techalerts/TA09-294A.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA10-012A.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.us-cert.gov/cas/techalerts/TA10-012A.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0016.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0016.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/2543","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vupen.com/english/advisories/2009/2543"},{"reference_url":"http://www.vupen.com/english/advisories/2009/3316","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vupen.com/english/advisories/2009/3316"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0359","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vupen.com/english/advisories/2011/0359"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548358","reference_id":"548358","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548358"},{"reference_url":"https://bugzilla.redhat.com/CVE-2009-2625","reference_id":"CVE-2009-2625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2009-2625"},{"reference_url":"https://github.com/advisories/GHSA-334p-wv2m-w3vp","reference_id":"GHSA-334p-wv2m-w3vp","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-334p-wv2m-w3vp"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1199","reference_id":"RHSA-2009:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1200","reference_id":"RHSA-2009:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1201","reference_id":"RHSA-2009:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1236","reference_id":"RHSA-2009:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1505","reference_id":"RHSA-2009:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1582","reference_id":"RHSA-2009:1582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1615","reference_id":"RHSA-2009:1615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1636","reference_id":"RHSA-2009:1636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1637","reference_id":"RHSA-2009:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1649","reference_id":"RHSA-2009:1649","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1650","reference_id":"RHSA-2009:1650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0858","reference_id":"RHSA-2011:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0725","reference_id":"RHSA-2012:0725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1232","reference_id":"RHSA-2012:1232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1537","reference_id":"RHSA-2012:1537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0763","reference_id":"RHSA-2013:0763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0763"},{"reference_url":"https://usn.ubuntu.com/814-1/","reference_id":"USN-814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/814-1/"},{"reference_url":"https://usn.ubuntu.com/890-1/","reference_id":"USN-890-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2625","GHSA-334p-wv2m-w3vp"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2gpd-vwgb-67cn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50748?format=json","vulnerability_id":"VCID-a6gd-ytpw-duan","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3872.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3872.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3872","reference_id":"","reference_type":"","scores":[{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93656","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93666","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93675","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93686","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93688","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93692","published_at":"2026-04-12T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93693","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.9371","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93717","published_at":"2026-04-18T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.9372","published_at":"2026-04-21T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93726","published_at":"2026-04-24T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93723","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93721","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93729","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.9374","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93749","published_at":"2026-05-09T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93751","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93756","published_at":"2026-05-12T12:55:00Z"},{"value":"0.1173","scoring_system":"epss","scoring_elements":"0.93769","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3872"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=532906","reference_id":"532906","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=532906"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1560","reference_id":"RHSA-2009:1560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1643","reference_id":"RHSA-2009:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1647","reference_id":"RHSA-2009:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"}],"fixed_packages":[],"aliases":["CVE-2009-3872"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a6gd-ytpw-duan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50684?format=json","vulnerability_id":"VCID-p2fp-hr1d-ske5","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-05/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=124344236532162&w=2","reference_id":"","reference_type":"","scores":[],"url":"http://marc.info/?l=bugtraq&m=124344236532162&w=2"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1100.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-1100.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1100","reference_id":"","reference_type":"","scores":[{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91658","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91543","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.9155","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91556","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91565","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91578","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91584","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91588","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.9159","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.9161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91605","published_at":"2026-04-21T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91612","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91611","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91608","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.9162","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91633","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91643","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91642","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07185","scoring_system":"epss","scoring_elements":"0.91651","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-1100"},{"reference_url":"http://secunia.com/advisories/34489","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34489"},{"reference_url":"http://secunia.com/advisories/34495","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34495"},{"reference_url":"http://secunia.com/advisories/34496","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34496"},{"reference_url":"http://secunia.com/advisories/35156","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35156"},{"reference_url":"http://secunia.com/advisories/35223","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35223"},{"reference_url":"http://secunia.com/advisories/35255","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35255"},{"reference_url":"http://secunia.com/advisories/35416","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35416"},{"reference_url":"http://secunia.com/advisories/35776","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35776"},{"reference_url":"http://secunia.com/advisories/36185","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/36185"},{"reference_url":"http://secunia.com/advisories/37386","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/37386"},{"reference_url":"http://secunia.com/advisories/37460","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/37460"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200911-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200911-02.xml"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6224","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6224"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1198.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2009-1198.html"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-19-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-19-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-254608-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-254608-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-108.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-109.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-109.htm"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.oracle.com/technetwork/topics/security/cpujul2009-091332.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0392.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0392.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0394.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0394.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-1038.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-1038.html"},{"reference_url":"http://www.securityfocus.com/archive/1/507985/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/507985/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/34240","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/34240"},{"reference_url":"http://www.securitytracker.com/id?1021917","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021917"},{"reference_url":"http://www.ubuntu.com/usn/usn-748-1","reference_id":"","reference_type":"","scores":[],"url":"http://www.ubuntu.com/usn/usn-748-1"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0016.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0016.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1426","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1426"},{"reference_url":"http://www.vupen.com/english/advisories/2009/3316","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/3316"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=492305","reference_id":"492305","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=492305"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:*:update_12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:*:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:*:update_12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update17:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:*:update17:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update17:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1100","reference_id":"CVE-2009-1100","reference_type":"","scores":[{"value":"5.0","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:L/Au:N/C:N/I:N/A:P"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-1100"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0392","reference_id":"RHSA-2009:0392","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0392"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0394","reference_id":"RHSA-2009:0394","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0394"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1038","reference_id":"RHSA-2009:1038","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1038"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1198","reference_id":"RHSA-2009:1198","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1198"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/748-1/","reference_id":"USN-748-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/748-1/"}],"fixed_packages":[],"aliases":["CVE-2009-1100"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p2fp-hr1d-ske5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50743?format=json","vulnerability_id":"VCID-pj8c-99t4-8khz","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3868.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3868.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3868","reference_id":"","reference_type":"","scores":[{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94079","published_at":"2026-04-01T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94089","published_at":"2026-04-02T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94099","published_at":"2026-04-04T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94103","published_at":"2026-04-07T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94112","published_at":"2026-04-08T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94116","published_at":"2026-04-09T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94121","published_at":"2026-04-13T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94137","published_at":"2026-04-16T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94142","published_at":"2026-04-21T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94144","published_at":"2026-04-29T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94145","published_at":"2026-04-26T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.9415","published_at":"2026-05-05T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94161","published_at":"2026-05-07T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94173","published_at":"2026-05-09T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94178","published_at":"2026-05-11T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94182","published_at":"2026-05-12T12:55:00Z"},{"value":"0.1314","scoring_system":"epss","scoring_elements":"0.94196","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3868"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=533215","reference_id":"533215","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=533215"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1560","reference_id":"RHSA-2009:1560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1571","reference_id":"RHSA-2009:1571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1643","reference_id":"RHSA-2009:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1647","reference_id":"RHSA-2009:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"}],"fixed_packages":[],"aliases":["CVE-2009-3868"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pj8c-99t4-8khz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50752?format=json","vulnerability_id":"VCID-pzcs-z6ju-qbcg","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3876.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3876.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3876","reference_id":"","reference_type":"","scores":[{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.9351","published_at":"2026-05-14T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93461","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93467","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93481","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93491","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93492","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93498","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.9343","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93451","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93456","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93462","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11021","scoring_system":"epss","scoring_elements":"0.93466","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93655","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93664","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93666","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93674","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93677","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11696","scoring_system":"epss","scoring_elements":"0.93645","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3876"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=530061","reference_id":"530061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=530061"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1560","reference_id":"RHSA-2009:1560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1571","reference_id":"RHSA-2009:1571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1584","reference_id":"RHSA-2009:1584","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1643","reference_id":"RHSA-2009:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1647","reference_id":"RHSA-2009:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/859-1/","reference_id":"USN-859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/859-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3876"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pzcs-z6ju-qbcg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50749?format=json","vulnerability_id":"VCID-sakk-3wvn-tfhe","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3873.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3873.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3873","reference_id":"","reference_type":"","scores":[{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93697","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93706","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93717","published_at":"2026-04-04T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.9372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.9373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93734","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93735","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93757","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93764","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93767","published_at":"2026-04-26T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93771","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93766","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93776","published_at":"2026-05-05T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93787","published_at":"2026-05-07T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93797","published_at":"2026-05-09T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93799","published_at":"2026-05-11T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93804","published_at":"2026-05-12T12:55:00Z"},{"value":"0.11882","scoring_system":"epss","scoring_elements":"0.93817","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3873"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=530053","reference_id":"530053","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=530053"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1560","reference_id":"RHSA-2009:1560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1571","reference_id":"RHSA-2009:1571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1584","reference_id":"RHSA-2009:1584","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1643","reference_id":"RHSA-2009:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1647","reference_id":"RHSA-2009:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/859-1/","reference_id":"USN-859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/859-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3873"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-sakk-3wvn-tfhe"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50755?format=json","vulnerability_id":"VCID-txfj-uzzx-4ue7","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3877.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-3877.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3877","reference_id":"","reference_type":"","scores":[{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93193","published_at":"2026-05-14T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93135","published_at":"2026-04-29T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93142","published_at":"2026-05-05T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93157","published_at":"2026-05-07T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93167","published_at":"2026-05-09T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93169","published_at":"2026-05-11T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93177","published_at":"2026-05-12T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93107","published_at":"2026-04-11T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93106","published_at":"2026-04-13T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93122","published_at":"2026-04-16T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93126","published_at":"2026-04-18T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93132","published_at":"2026-04-21T12:55:00Z"},{"value":"0.10153","scoring_system":"epss","scoring_elements":"0.93139","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14874","scoring_system":"epss","scoring_elements":"0.94496","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14874","scoring_system":"epss","scoring_elements":"0.94504","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14874","scoring_system":"epss","scoring_elements":"0.94506","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14874","scoring_system":"epss","scoring_elements":"0.94516","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14874","scoring_system":"epss","scoring_elements":"0.9452","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14874","scoring_system":"epss","scoring_elements":"0.94489","published_at":"2026-04-01T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-3877"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=530061","reference_id":"530061","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=530061"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1560","reference_id":"RHSA-2009:1560","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1560"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1571","reference_id":"RHSA-2009:1571","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1571"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1584","reference_id":"RHSA-2009:1584","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1584"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1643","reference_id":"RHSA-2009:1643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1647","reference_id":"RHSA-2009:1647","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1647"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/859-1/","reference_id":"USN-859-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/859-1/"}],"fixed_packages":[],"aliases":["CVE-2009-3877"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-txfj-uzzx-4ue7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50664?format=json","vulnerability_id":"VCID-y12r-7vqr-wqg5","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133","reference_id":"","reference_type":"","scores":[],"url":"http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01745133"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html","reference_id":"","reference_type":"","scores":[],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"},{"reference_url":"http://osvdb.org/50504","reference_id":"","reference_type":"","scores":[],"url":"http://osvdb.org/50504"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-1018.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-1018.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2008-1025.html","reference_id":"","reference_type":"","scores":[],"url":"http://rhn.redhat.com/errata/RHSA-2008-1025.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5349.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-5349.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5349","reference_id":"","reference_type":"","scores":[{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.92037","published_at":"2026-05-14T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91924","published_at":"2026-04-01T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91932","published_at":"2026-04-02T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.9194","published_at":"2026-04-04T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91959","published_at":"2026-04-08T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91964","published_at":"2026-04-09T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91962","published_at":"2026-04-13T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91979","published_at":"2026-04-18T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91975","published_at":"2026-04-29T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.9198","published_at":"2026-04-24T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91978","published_at":"2026-04-26T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.91988","published_at":"2026-05-05T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.92002","published_at":"2026-05-07T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.92011","published_at":"2026-05-09T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.92012","published_at":"2026-05-11T12:55:00Z"},{"value":"0.07779","scoring_system":"epss","scoring_elements":"0.9202","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-5349"},{"reference_url":"http://secunia.com/advisories/32991","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/32991"},{"reference_url":"http://secunia.com/advisories/33015","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33015"},{"reference_url":"http://secunia.com/advisories/33709","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/33709"},{"reference_url":"http://secunia.com/advisories/34259","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34259"},{"reference_url":"http://secunia.com/advisories/34972","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/34972"},{"reference_url":"http://secunia.com/advisories/35255","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/35255"},{"reference_url":"http://secunia.com/advisories/37386","reference_id":"","reference_type":"","scores":[],"url":"http://secunia.com/advisories/37386"},{"reference_url":"http://security.gentoo.org/glsa/glsa-200911-02.xml","reference_id":"","reference_type":"","scores":[],"url":"http://security.gentoo.org/glsa/glsa-200911-02.xml"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47064","reference_id":"","reference_type":"","scores":[],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/47064"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5843","reference_id":"","reference_type":"","scores":[],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5843"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-0466.html","reference_id":"","reference_type":"","scores":[],"url":"https://rhn.redhat.com/errata/RHSA-2009-0466.html"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-246286-1","reference_id":"","reference_type":"","scores":[],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-246286-1"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2008-491.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2008-491.htm"},{"reference_url":"http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm","reference_id":"","reference_type":"","scores":[],"url":"http://support.avaya.com/elmodocs2/security/ASA-2009-012.htm"},{"reference_url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid=","reference_id":"","reference_type":"","scores":[],"url":"http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&DocumentOID=829914&poid="},{"reference_url":"http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf","reference_id":"","reference_type":"","scores":[],"url":"http://www116.nortel.com/pub/repository/CLARIFY/DOCUMENT/2009/03/024431-01.pdf"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-0016.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.redhat.com/support/errata/RHSA-2009-0016.html"},{"reference_url":"http://www.securityfocus.com/archive/1/504010/100/0/threaded","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/archive/1/504010/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/32608","reference_id":"","reference_type":"","scores":[],"url":"http://www.securityfocus.com/bid/32608"},{"reference_url":"http://www.securitytracker.com/id?1021309","reference_id":"","reference_type":"","scores":[],"url":"http://www.securitytracker.com/id?1021309"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA08-340A.html","reference_id":"","reference_type":"","scores":[],"url":"http://www.us-cert.gov/cas/techalerts/TA08-340A.html"},{"reference_url":"http://www.vupen.com/english/advisories/2008/3339","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2008/3339"},{"reference_url":"http://www.vupen.com/english/advisories/2009/1426","reference_id":"","reference_type":"","scores":[],"url":"http://www.vupen.com/english/advisories/2009/1426"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=472206","reference_id":"472206","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=472206"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:5.0:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:6:update_8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jdk:*:update_16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:5.0:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_6:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_7:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:6:update_8:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_10:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*","reference_id":"cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:sun:jre:*:update_16:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5349","reference_id":"CVE-2008-5349","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:C"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-5349"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1018","reference_id":"RHSA-2008:1018","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1018"},{"reference_url":"https://access.redhat.com/errata/RHSA-2008:1025","reference_id":"RHSA-2008:1025","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2008:1025"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0016","reference_id":"RHSA-2009:0016","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0016"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:0466","reference_id":"RHSA-2009:0466","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:0466"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1505","reference_id":"RHSA-2009:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://usn.ubuntu.com/713-1/","reference_id":"USN-713-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/713-1/"}],"fixed_packages":[],"aliases":["CVE-2008-5349"],"risk_score":3.2,"exploitability":"0.5","weighted_severity":"6.4","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y12r-7vqr-wqg5"}],"fixing_vulnerabilities":[],"risk_score":"3.2","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.2.sap-1jpp.4%3Farch=el4_8"}