{"url":"http://public2.vulnerablecode.io/api/packages/128337?format=json","purl":"pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.10-1jpp.4?arch=el4","type":"rpm","namespace":"redhat","name":"java-1.5.0-ibm","version":"1:1.5.0.10-1jpp.4","qualifiers":{"arch":"el4"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50706?format=json","vulnerability_id":"VCID-1c8j-4sxr-sqen","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2672.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2672.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2672","reference_id":"","reference_type":"","scores":[{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.9432","published_at":"2026-04-01T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.94329","published_at":"2026-04-02T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.94339","published_at":"2026-04-04T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.9434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.94349","published_at":"2026-04-08T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.94354","published_at":"2026-04-09T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.94357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.94358","published_at":"2026-04-12T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.94359","published_at":"2026-04-13T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.94375","published_at":"2026-04-16T12:55:00Z"},{"value":"0.14114","scoring_system":"epss","scoring_elements":"0.9438","published_at":"2026-04-18T12:55:00Z"},{"value":"0.17519","scoring_system":"epss","scoring_elements":"0.95097","published_at":"2026-04-24T12:55:00Z"},{"value":"0.17519","scoring_system":"epss","scoring_elements":"0.95098","published_at":"2026-04-29T12:55:00Z"},{"value":"0.17519","scoring_system":"epss","scoring_elements":"0.9511","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2672"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=512907","reference_id":"512907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=512907"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1199","reference_id":"RHSA-2009:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1200","reference_id":"RHSA-2009:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1201","reference_id":"RHSA-2009:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1236","reference_id":"RHSA-2009:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1582","reference_id":"RHSA-2009:1582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/814-1/","reference_id":"USN-814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/814-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2672"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1c8j-4sxr-sqen"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/4799?format=json","vulnerability_id":"VCID-2gpd-vwgb-67cn","summary":"XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.","references":[{"reference_url":"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html"},{"reference_url":"http://marc.info/?l=bugtraq&m=125787273209737&w=2","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://marc.info/?l=bugtraq&m=125787273209737&w=2"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1232.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2012-1232.html"},{"reference_url":"http://rhn.redhat.com/errata/RHSA-2012-1537.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://rhn.redhat.com/errata/RHSA-2012-1537.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2625.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2625.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2625","reference_id":"","reference_type":"","scores":[{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79377","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79386","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79361","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79356","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79324","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79323","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01246","scoring_system":"epss","scoring_elements":"0.79326","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81485","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81422","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81432","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81453","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81451","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81479","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01562","scoring_system":"epss","scoring_elements":"0.81506","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01746","scoring_system":"epss","scoring_elements":"0.82541","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01746","scoring_system":"epss","scoring_elements":"0.82536","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2625"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=512921","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=512921"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625"},{"reference_url":"http://secunia.com/advisories/36162","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/36162"},{"reference_url":"http://secunia.com/advisories/36176","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/36176"},{"reference_url":"http://secunia.com/advisories/36180","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/36180"},{"reference_url":"http://secunia.com/advisories/36199","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/36199"},{"reference_url":"http://secunia.com/advisories/37300","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/37300"},{"reference_url":"http://secunia.com/advisories/37460","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/37460"},{"reference_url":"http://secunia.com/advisories/37671","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/37671"},{"reference_url":"http://secunia.com/advisories/37754","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/37754"},{"reference_url":"http://secunia.com/advisories/38231","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/38231"},{"reference_url":"http://secunia.com/advisories/38342","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/38342"},{"reference_url":"http://secunia.com/advisories/43300","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/43300"},{"reference_url":"http://secunia.com/advisories/50549","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://secunia.com/advisories/50549"},{"reference_url":"https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b"},{"reference_url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026"},{"reference_url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2625","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2009-2625"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520"},{"reference_url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1199.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1199.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1200.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1200.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1201.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1201.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1636.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1636.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1637.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1637.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1649.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1649.html"},{"reference_url":"https://rhn.redhat.com/errata/RHSA-2009-1650.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://rhn.redhat.com/errata/RHSA-2009-1650.html"},{"reference_url":"https://snyk.io/vuln/SNYK-JAVA-XERCES-32014","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://snyk.io/vuln/SNYK-JAVA-XERCES-32014"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1"},{"reference_url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1"},{"reference_url":"http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html"},{"reference_url":"http://www.cert.fi/en/reports/2009/vulnerability2009085.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.cert.fi/en/reports/2009/vulnerability2009085.html"},{"reference_url":"http://www.codenomicon.com/labs/xml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.codenomicon.com/labs/xml"},{"reference_url":"http://www.codenomicon.com/labs/xml/","reference_id":"","reference_type":"","scores":[],"url":"http://www.codenomicon.com/labs/xml/"},{"reference_url":"http://www.debian.org/security/2010/dsa-1984","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2010/dsa-1984"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209"},{"reference_url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:108","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.mandriva.com/security/advisories?name=MDVSA-2011:108"},{"reference_url":"http://www.networkworld.com/columnists/2009/080509-xml-flaw.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.networkworld.com/columnists/2009/080509-xml-flaw.html"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/09/06/1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/09/06/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/10/22/9","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/10/22/9"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/10/23/6","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/10/23/6"},{"reference_url":"http://www.openwall.com/lists/oss-security/2009/10/26/3","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2009/10/26/3"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html"},{"reference_url":"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2009-1615.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2009-1615.html"},{"reference_url":"http://www.redhat.com/support/errata/RHSA-2011-0858.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.redhat.com/support/errata/RHSA-2011-0858.html"},{"reference_url":"http://www.securityfocus.com/archive/1/507985/100/0/threaded","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/archive/1/507985/100/0/threaded"},{"reference_url":"http://www.securityfocus.com/bid/35958","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securityfocus.com/bid/35958"},{"reference_url":"http://www.securitytracker.com/id?1022680","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.securitytracker.com/id?1022680"},{"reference_url":"http://www.ubuntu.com/usn/USN-890-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.ubuntu.com/usn/USN-890-1"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA09-294A.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.us-cert.gov/cas/techalerts/TA09-294A.html"},{"reference_url":"http://www.us-cert.gov/cas/techalerts/TA10-012A.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.us-cert.gov/cas/techalerts/TA10-012A.html"},{"reference_url":"http://www.vmware.com/security/advisories/VMSA-2009-0016.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vmware.com/security/advisories/VMSA-2009-0016.html"},{"reference_url":"http://www.vupen.com/english/advisories/2009/2543","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vupen.com/english/advisories/2009/2543"},{"reference_url":"http://www.vupen.com/english/advisories/2009/3316","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vupen.com/english/advisories/2009/3316"},{"reference_url":"http://www.vupen.com/english/advisories/2011/0359","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.vupen.com/english/advisories/2011/0359"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548358","reference_id":"548358","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=548358"},{"reference_url":"https://bugzilla.redhat.com/CVE-2009-2625","reference_id":"CVE-2009-2625","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/CVE-2009-2625"},{"reference_url":"https://github.com/advisories/GHSA-334p-wv2m-w3vp","reference_id":"GHSA-334p-wv2m-w3vp","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-334p-wv2m-w3vp"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1199","reference_id":"RHSA-2009:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1200","reference_id":"RHSA-2009:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1201","reference_id":"RHSA-2009:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1236","reference_id":"RHSA-2009:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1505","reference_id":"RHSA-2009:1505","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1505"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1551","reference_id":"RHSA-2009:1551","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1551"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1582","reference_id":"RHSA-2009:1582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1615","reference_id":"RHSA-2009:1615","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1615"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1636","reference_id":"RHSA-2009:1636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1637","reference_id":"RHSA-2009:1637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1649","reference_id":"RHSA-2009:1649","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1649"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1650","reference_id":"RHSA-2009:1650","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1650"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://access.redhat.com/errata/RHSA-2011:0858","reference_id":"RHSA-2011:0858","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2011:0858"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:0725","reference_id":"RHSA-2012:0725","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:0725"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1232","reference_id":"RHSA-2012:1232","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1232"},{"reference_url":"https://access.redhat.com/errata/RHSA-2012:1537","reference_id":"RHSA-2012:1537","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2012:1537"},{"reference_url":"https://access.redhat.com/errata/RHSA-2013:0763","reference_id":"RHSA-2013:0763","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2013:0763"},{"reference_url":"https://usn.ubuntu.com/814-1/","reference_id":"USN-814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/814-1/"},{"reference_url":"https://usn.ubuntu.com/890-1/","reference_id":"USN-890-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/890-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2625","GHSA-334p-wv2m-w3vp"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2gpd-vwgb-67cn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50713?format=json","vulnerability_id":"VCID-52v7-ahwt-n7bj","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2675.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2675.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2675","reference_id":"","reference_type":"","scores":[{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91297","published_at":"2026-04-01T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91301","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91312","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91319","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91331","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91337","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91344","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91371","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.9138","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91379","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06835","scoring_system":"epss","scoring_elements":"0.91394","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2675"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=512920","reference_id":"512920","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=512920"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1199","reference_id":"RHSA-2009:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1200","reference_id":"RHSA-2009:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1201","reference_id":"RHSA-2009:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1236","reference_id":"RHSA-2009:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1582","reference_id":"RHSA-2009:1582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/814-1/","reference_id":"USN-814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/814-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2675"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-52v7-ahwt-n7bj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50707?format=json","vulnerability_id":"VCID-jgc1-svry-fufd","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2673.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2673.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2673","reference_id":"","reference_type":"","scores":[{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93528","published_at":"2026-04-01T12:55:00Z"},{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93537","published_at":"2026-04-02T12:55:00Z"},{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93545","published_at":"2026-04-07T12:55:00Z"},{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93554","published_at":"2026-04-08T12:55:00Z"},{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93557","published_at":"2026-04-09T12:55:00Z"},{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93563","published_at":"2026-04-13T12:55:00Z"},{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93562","published_at":"2026-04-12T12:55:00Z"},{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93582","published_at":"2026-04-16T12:55:00Z"},{"value":"0.11393","scoring_system":"epss","scoring_elements":"0.93589","published_at":"2026-04-18T12:55:00Z"},{"value":"0.14277","scoring_system":"epss","scoring_elements":"0.94421","published_at":"2026-04-21T12:55:00Z"},{"value":"0.14277","scoring_system":"epss","scoring_elements":"0.94422","published_at":"2026-04-24T12:55:00Z"},{"value":"0.14277","scoring_system":"epss","scoring_elements":"0.9442","published_at":"2026-04-26T12:55:00Z"},{"value":"0.14277","scoring_system":"epss","scoring_elements":"0.94418","published_at":"2026-04-29T12:55:00Z"},{"value":"0.14277","scoring_system":"epss","scoring_elements":"0.94424","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2673"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=512914","reference_id":"512914","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=512914"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1199","reference_id":"RHSA-2009:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1200","reference_id":"RHSA-2009:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1201","reference_id":"RHSA-2009:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1236","reference_id":"RHSA-2009:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1582","reference_id":"RHSA-2009:1582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/814-1/","reference_id":"USN-814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/814-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2673"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jgc1-svry-fufd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50700?format=json","vulnerability_id":"VCID-xt9m-tfuj-6uht","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2670.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2670.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2670","reference_id":"","reference_type":"","scores":[{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87809","published_at":"2026-04-01T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.8782","published_at":"2026-04-02T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87834","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87856","published_at":"2026-04-08T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87862","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87873","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87867","published_at":"2026-04-12T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87866","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.8788","published_at":"2026-04-16T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87879","published_at":"2026-04-18T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87876","published_at":"2026-04-21T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87892","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87898","published_at":"2026-04-26T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87896","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03648","scoring_system":"epss","scoring_elements":"0.87907","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2670"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=512896","reference_id":"512896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=512896"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1199","reference_id":"RHSA-2009:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1200","reference_id":"RHSA-2009:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1201","reference_id":"RHSA-2009:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1236","reference_id":"RHSA-2009:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1582","reference_id":"RHSA-2009:1582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/814-1/","reference_id":"USN-814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/814-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2670"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xt9m-tfuj-6uht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/50702?format=json","vulnerability_id":"VCID-ypf2-kcj7-hfh5","summary":"Multiple vulnerabilities in the Sun JDK and JRE allow for several attacks,\n    including the remote execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2671.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2009-2671.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2671","reference_id":"","reference_type":"","scores":[{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91205","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.9121","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91219","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91238","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91245","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91252","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91255","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91254","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0671","scoring_system":"epss","scoring_elements":"0.91278","published_at":"2026-04-18T12:55:00Z"},{"value":"0.11181","scoring_system":"epss","scoring_elements":"0.93522","published_at":"2026-04-21T12:55:00Z"},{"value":"0.11181","scoring_system":"epss","scoring_elements":"0.93525","published_at":"2026-04-24T12:55:00Z"},{"value":"0.11181","scoring_system":"epss","scoring_elements":"0.93523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.11181","scoring_system":"epss","scoring_elements":"0.9353","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2009-2671"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=512907","reference_id":"512907","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=512907"},{"reference_url":"https://security.gentoo.org/glsa/200911-02","reference_id":"GLSA-200911-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200911-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1199","reference_id":"RHSA-2009:1199","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1199"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1200","reference_id":"RHSA-2009:1200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1201","reference_id":"RHSA-2009:1201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1236","reference_id":"RHSA-2009:1236","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1236"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1582","reference_id":"RHSA-2009:1582","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1582"},{"reference_url":"https://access.redhat.com/errata/RHSA-2009:1662","reference_id":"RHSA-2009:1662","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2009:1662"},{"reference_url":"https://access.redhat.com/errata/RHSA-2010:0043","reference_id":"RHSA-2010:0043","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2010:0043"},{"reference_url":"https://usn.ubuntu.com/814-1/","reference_id":"USN-814-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/814-1/"}],"fixed_packages":[],"aliases":["CVE-2009-2671"],"risk_score":0.1,"exploitability":"0.5","weighted_severity":"0.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ypf2-kcj7-hfh5"}],"fixing_vulnerabilities":[],"risk_score":"3.1","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/java-1.5.0-ibm@1:1.5.0.10-1jpp.4%3Farch=el4"}